From ed920894984ba9a6c025d9266738f81953ace41b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 9 Jul 2024 20:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-07-09T20:00:19.076178+00:00 --- CVE-2010/CVE-2010-43xx/CVE-2010-4398.json | 127 ++- CVE-2011/CVE-2011-20xx/CVE-2011-2005.json | 57 +- CVE-2012/CVE-2012-05xx/CVE-2012-0518.json | 34 +- CVE-2012/CVE-2012-25xx/CVE-2012-2539.json | 58 +- CVE-2013/CVE-2013-16xx/CVE-2013-1690.json | 410 ++++++--- CVE-2013/CVE-2013-25xx/CVE-2013-2551.json | 242 ++++- CVE-2013/CVE-2013-27xx/CVE-2013-2729.json | 543 ++---------- CVE-2013/CVE-2013-36xx/CVE-2013-3660.json | 122 ++- CVE-2015/CVE-2015-17xx/CVE-2015-1770.json | 57 +- CVE-2015/CVE-2015-24xx/CVE-2015-2419.json | 116 ++- CVE-2016/CVE-2016-00xx/CVE-2016-0040.json | 46 +- CVE-2016/CVE-2016-01xx/CVE-2016-0151.json | 46 +- CVE-2016/CVE-2016-01xx/CVE-2016-0189.json | 231 ++++- CVE-2016/CVE-2016-72xx/CVE-2016-7200.json | 94 +- CVE-2016/CVE-2016-72xx/CVE-2016-7201.json | 95 +- CVE-2017/CVE-2017-01xx/CVE-2017-0148.json | 345 ++++++- CVE-2017/CVE-2017-02xx/CVE-2017-0213.json | 82 +- CVE-2021/CVE-2021-215xx/CVE-2021-21551.json | 13 +- CVE-2021/CVE-2021-311xx/CVE-2021-31166.json | 25 +- CVE-2021/CVE-2021-31xx/CVE-2021-3156.json | 156 ++-- CVE-2021/CVE-2021-344xx/CVE-2021-34484.json | 68 +- CVE-2021/CVE-2021-422xx/CVE-2021-42287.json | 29 +- CVE-2022/CVE-2022-451xx/CVE-2022-45147.json | 4 +- CVE-2023/CVE-2023-327xx/CVE-2023-32735.json | 4 +- CVE-2023/CVE-2023-327xx/CVE-2023-32737.json | 4 +- CVE-2023/CVE-2023-32xx/CVE-2023-3285.json | 4 +- CVE-2023/CVE-2023-32xx/CVE-2023-3286.json | 8 +- CVE-2023/CVE-2023-32xx/CVE-2023-3287.json | 8 +- CVE-2023/CVE-2023-32xx/CVE-2023-3288.json | 8 +- CVE-2023/CVE-2023-32xx/CVE-2023-3289.json | 8 +- CVE-2023/CVE-2023-32xx/CVE-2023-3290.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38047.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38048.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38049.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38050.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38051.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38052.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38053.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38054.json | 8 +- CVE-2023/CVE-2023-380xx/CVE-2023-38055.json | 8 +- CVE-2023/CVE-2023-388xx/CVE-2023-38817.json | 10 +- CVE-2023/CVE-2023-393xx/CVE-2023-39328.json | 4 +- CVE-2023/CVE-2023-403xx/CVE-2023-40356.json | 4 +- CVE-2023/CVE-2023-407xx/CVE-2023-40702.json | 4 +- CVE-2023/CVE-2023-481xx/CVE-2023-48194.json | 25 + CVE-2023/CVE-2023-501xx/CVE-2023-50178.json | 4 +- CVE-2023/CVE-2023-501xx/CVE-2023-50179.json | 4 +- CVE-2023/CVE-2023-501xx/CVE-2023-50181.json | 4 +- CVE-2023/CVE-2023-508xx/CVE-2023-50805.json | 48 + CVE-2023/CVE-2023-508xx/CVE-2023-50806.json | 48 + CVE-2023/CVE-2023-508xx/CVE-2023-50807.json | 48 + CVE-2023/CVE-2023-522xx/CVE-2023-52237.json | 4 +- CVE-2023/CVE-2023-522xx/CVE-2023-52238.json | 4 +- CVE-2023/CVE-2023-528xx/CVE-2023-52891.json | 4 +- CVE-2024/CVE-2024-13xx/CVE-2024-1305.json | 4 +- CVE-2024/CVE-2024-207xx/CVE-2024-20701.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21303.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21308.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21317.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21331.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21332.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21333.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21335.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21373.json | 4 +- CVE-2024/CVE-2024-213xx/CVE-2024-21398.json | 4 +- CVE-2024/CVE-2024-214xx/CVE-2024-21414.json | 4 +- CVE-2024/CVE-2024-214xx/CVE-2024-21415.json | 4 +- CVE-2024/CVE-2024-214xx/CVE-2024-21425.json | 4 +- CVE-2024/CVE-2024-214xx/CVE-2024-21428.json | 4 +- CVE-2024/CVE-2024-214xx/CVE-2024-21449.json | 4 +- CVE-2024/CVE-2024-217xx/CVE-2024-21729.json | 4 +- CVE-2024/CVE-2024-217xx/CVE-2024-21730.json | 4 +- CVE-2024/CVE-2024-217xx/CVE-2024-21731.json | 4 +- CVE-2024/CVE-2024-217xx/CVE-2024-21759.json | 4 +- CVE-2024/CVE-2024-21xx/CVE-2024-2177.json | 4 +- CVE-2024/CVE-2024-220xx/CVE-2024-22020.json | 4 +- CVE-2024/CVE-2024-220xx/CVE-2024-22062.json | 8 +- CVE-2024/CVE-2024-222xx/CVE-2024-22271.json | 4 +- CVE-2024/CVE-2024-235xx/CVE-2024-23562.json | 4 +- CVE-2024/CVE-2024-236xx/CVE-2024-23663.json | 4 +- CVE-2024/CVE-2024-260xx/CVE-2024-26015.json | 4 +- CVE-2024/CVE-2024-261xx/CVE-2024-26184.json | 4 +- CVE-2024/CVE-2024-262xx/CVE-2024-26278.json | 4 +- CVE-2024/CVE-2024-262xx/CVE-2024-26279.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27183.json | 33 + CVE-2024/CVE-2024-273xx/CVE-2024-27360.json | 48 + CVE-2024/CVE-2024-273xx/CVE-2024-27362.json | 48 + CVE-2024/CVE-2024-277xx/CVE-2024-27782.json | 4 +- CVE-2024/CVE-2024-277xx/CVE-2024-27783.json | 4 +- CVE-2024/CVE-2024-277xx/CVE-2024-27784.json | 4 +- CVE-2024/CVE-2024-277xx/CVE-2024-27785.json | 4 +- CVE-2024/CVE-2024-280xx/CVE-2024-28067.json | 48 + CVE-2024/CVE-2024-287xx/CVE-2024-28747.json | 8 +- CVE-2024/CVE-2024-287xx/CVE-2024-28748.json | 8 +- CVE-2024/CVE-2024-287xx/CVE-2024-28749.json | 8 +- CVE-2024/CVE-2024-287xx/CVE-2024-28750.json | 8 +- CVE-2024/CVE-2024-287xx/CVE-2024-28751.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28882.json | 4 +- CVE-2024/CVE-2024-288xx/CVE-2024-28899.json | 4 +- CVE-2024/CVE-2024-289xx/CVE-2024-28928.json | 4 +- CVE-2024/CVE-2024-300xx/CVE-2024-30013.json | 4 +- CVE-2024/CVE-2024-300xx/CVE-2024-30061.json | 4 +- CVE-2024/CVE-2024-300xx/CVE-2024-30071.json | 4 +- CVE-2024/CVE-2024-300xx/CVE-2024-30079.json | 4 +- CVE-2024/CVE-2024-300xx/CVE-2024-30081.json | 4 +- CVE-2024/CVE-2024-300xx/CVE-2024-30098.json | 4 +- CVE-2024/CVE-2024-301xx/CVE-2024-30105.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30321.json | 4 +- CVE-2024/CVE-2024-319xx/CVE-2024-31957.json | 48 + CVE-2024/CVE-2024-319xx/CVE-2024-31982.json | 7 +- CVE-2024/CVE-2024-320xx/CVE-2024-32056.json | 4 +- CVE-2024/CVE-2024-329xx/CVE-2024-32987.json | 4 +- CVE-2024/CVE-2024-32xx/CVE-2024-3228.json | 8 +- CVE-2024/CVE-2024-335xx/CVE-2024-33509.json | 4 +- CVE-2024/CVE-2024-336xx/CVE-2024-33653.json | 4 +- CVE-2024/CVE-2024-336xx/CVE-2024-33654.json | 4 +- CVE-2024/CVE-2024-341xx/CVE-2024-34123.json | 56 ++ CVE-2024/CVE-2024-346xx/CVE-2024-34685.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34689.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34692.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34702.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34786.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3410.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35256.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35261.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35264.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35266.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35267.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35270.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35271.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35272.json | 4 +- CVE-2024/CVE-2024-357xx/CVE-2024-35777.json | 4 +- CVE-2024/CVE-2024-35xx/CVE-2024-3563.json | 8 +- CVE-2024/CVE-2024-35xx/CVE-2024-3596.json | 4 +- CVE-2024/CVE-2024-365xx/CVE-2024-36526.json | 4 +- CVE-2024/CVE-2024-368xx/CVE-2024-36843.json | 7 +- CVE-2024/CVE-2024-36xx/CVE-2024-3603.json | 8 +- CVE-2024/CVE-2024-36xx/CVE-2024-3604.json | 8 +- CVE-2024/CVE-2024-36xx/CVE-2024-3608.json | 8 +- CVE-2024/CVE-2024-36xx/CVE-2024-3653.json | 8 +- CVE-2024/CVE-2024-370xx/CVE-2024-37090.json | 4 +- CVE-2024/CVE-2024-371xx/CVE-2024-37112.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37171.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37172.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37173.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37174.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37175.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37180.json | 8 +- CVE-2024/CVE-2024-372xx/CVE-2024-37224.json | 4 +- CVE-2024/CVE-2024-372xx/CVE-2024-37225.json | 8 +- CVE-2024/CVE-2024-372xx/CVE-2024-37253.json | 4 +- CVE-2024/CVE-2024-372xx/CVE-2024-37256.json | 8 +- CVE-2024/CVE-2024-372xx/CVE-2024-37260.json | 47 +- CVE-2024/CVE-2024-372xx/CVE-2024-37266.json | 4 +- CVE-2024/CVE-2024-372xx/CVE-2024-37268.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37318.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37319.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37320.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37321.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37322.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37323.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37324.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37326.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37327.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37328.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37329.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37330.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37331.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37332.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37333.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37334.json | 4 +- CVE-2024/CVE-2024-373xx/CVE-2024-37336.json | 4 +- CVE-2024/CVE-2024-374xx/CVE-2024-37410.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37418.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37419.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37420.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37424.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37430.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37437.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37442.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37454.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37455.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37462.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37464.json | 4 +- CVE-2024/CVE-2024-374xx/CVE-2024-37484.json | 4 +- CVE-2024/CVE-2024-374xx/CVE-2024-37486.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37494.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37497.json | 4 +- CVE-2024/CVE-2024-374xx/CVE-2024-37499.json | 4 +- CVE-2024/CVE-2024-375xx/CVE-2024-37501.json | 4 +- CVE-2024/CVE-2024-375xx/CVE-2024-37502.json | 8 +- CVE-2024/CVE-2024-375xx/CVE-2024-37513.json | 4 +- CVE-2024/CVE-2024-375xx/CVE-2024-37520.json | 4 +- CVE-2024/CVE-2024-375xx/CVE-2024-37555.json | 4 +- CVE-2024/CVE-2024-378xx/CVE-2024-37870.json | 21 + CVE-2024/CVE-2024-379xx/CVE-2024-37923.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37934.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37952.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37969.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37970.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37971.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37972.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37973.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37974.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37975.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37977.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37978.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37981.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37984.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37986.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37987.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37988.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37989.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37996.json | 4 +- CVE-2024/CVE-2024-379xx/CVE-2024-37997.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38010.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38011.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38013.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38015.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38017.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38019.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38020.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38021.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38022.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38023.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38024.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38025.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38027.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38028.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38030.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38031.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38032.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38033.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38034.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38041.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38043.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38044.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38047.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38048.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38049.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38050.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38051.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38052.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38053.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38054.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38055.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38056.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38057.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38058.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38059.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38060.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38061.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38062.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38064.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38065.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38066.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38067.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38068.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38069.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38070.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38071.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38072.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38073.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38074.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38076.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38077.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38078.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38079.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38080.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38081.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38085.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38086.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38087.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38088.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38089.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38091.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38092.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38094.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38095.json | 4 +- CVE-2024/CVE-2024-380xx/CVE-2024-38099.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38100.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38101.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38102.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38104.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38105.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38112.json | 4 +- CVE-2024/CVE-2024-382xx/CVE-2024-38278.json | 4 +- CVE-2024/CVE-2024-383xx/CVE-2024-38363.json | 4 +- CVE-2024/CVE-2024-383xx/CVE-2024-38372.json | 8 +- CVE-2024/CVE-2024-385xx/CVE-2024-38517.json | 64 ++ CVE-2024/CVE-2024-388xx/CVE-2024-38867.json | 4 +- CVE-2024/CVE-2024-389xx/CVE-2024-38970.json | 25 + CVE-2024/CVE-2024-389xx/CVE-2024-38971.json | 25 + CVE-2024/CVE-2024-389xx/CVE-2024-38972.json | 21 + CVE-2024/CVE-2024-391xx/CVE-2024-39118.json | 4 +- CVE-2024/CVE-2024-391xx/CVE-2024-39171.json | 4 +- CVE-2024/CVE-2024-393xx/CVE-2024-39312.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39487.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39567.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39568.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39569.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39570.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39571.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39592.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39593.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39594.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39595.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39596.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39597.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39598.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39599.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39600.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39675.json | 4 +- CVE-2024/CVE-2024-396xx/CVE-2024-39684.json | 56 ++ CVE-2024/CVE-2024-396xx/CVE-2024-39697.json | 4 +- CVE-2024/CVE-2024-396xx/CVE-2024-39698.json | 68 ++ CVE-2024/CVE-2024-397xx/CVE-2024-39701.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39865.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39866.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39867.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39868.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39869.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39870.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39871.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39872.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39873.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39874.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39875.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39876.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39888.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39895.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39896.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39897.json | 60 ++ CVE-2024/CVE-2024-398xx/CVE-2024-39899.json | 68 ++ CVE-2024/CVE-2024-400xx/CVE-2024-40034.json | 21 + CVE-2024/CVE-2024-400xx/CVE-2024-40035.json | 21 + CVE-2024/CVE-2024-400xx/CVE-2024-40036.json | 21 + CVE-2024/CVE-2024-400xx/CVE-2024-40037.json | 21 + CVE-2024/CVE-2024-400xx/CVE-2024-40038.json | 21 + CVE-2024/CVE-2024-400xx/CVE-2024-40039.json | 21 + CVE-2024/CVE-2024-406xx/CVE-2024-40601.json | 64 +- CVE-2024/CVE-2024-407xx/CVE-2024-40726.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40727.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40728.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40729.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40730.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40731.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40732.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40733.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40734.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40735.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40736.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40737.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40738.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40739.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40740.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40741.json | 21 + CVE-2024/CVE-2024-407xx/CVE-2024-40742.json | 21 + CVE-2024/CVE-2024-41xx/CVE-2024-4100.json | 8 +- CVE-2024/CVE-2024-41xx/CVE-2024-4102.json | 8 +- CVE-2024/CVE-2024-46xx/CVE-2024-4667.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4862.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4868.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4882.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4944.json | 8 +- CVE-2024/CVE-2024-53xx/CVE-2024-5389.json | 21 +- CVE-2024/CVE-2024-54xx/CVE-2024-5441.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5456.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5457.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5479.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5488.json | 8 +- CVE-2024/CVE-2024-55xx/CVE-2024-5549.json | 8 +- CVE-2024/CVE-2024-55xx/CVE-2024-5569.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5600.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5631.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5632.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5633.json | 4 +- CVE-2024/CVE-2024-56xx/CVE-2024-5634.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5648.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5652.json | 4 +- CVE-2024/CVE-2024-56xx/CVE-2024-5669.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5704.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5793.json | 8 +- CVE-2024/CVE-2024-58xx/CVE-2024-5802.json | 8 +- CVE-2024/CVE-2024-58xx/CVE-2024-5810.json | 8 +- CVE-2024/CVE-2024-58xx/CVE-2024-5855.json | 8 +- CVE-2024/CVE-2024-58xx/CVE-2024-5856.json | 8 +- CVE-2024/CVE-2024-58xx/CVE-2024-5881.json | 4 +- CVE-2024/CVE-2024-59xx/CVE-2024-5937.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5946.json | 4 +- CVE-2024/CVE-2024-59xx/CVE-2024-5971.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5974.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5992.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5993.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6069.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6123.json | 4 +- CVE-2024/CVE-2024-61xx/CVE-2024-6161.json | 4 +- CVE-2024/CVE-2024-61xx/CVE-2024-6166.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6167.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6168.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6169.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6170.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6171.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6180.json | 4 +- CVE-2024/CVE-2024-62xx/CVE-2024-6222.json | 78 ++ CVE-2024/CVE-2024-62xx/CVE-2024-6227.json | 8 +- CVE-2024/CVE-2024-62xx/CVE-2024-6237.json | 8 +- CVE-2024/CVE-2024-63xx/CVE-2024-6309.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6310.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6313.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6314.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6316.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6317.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6320.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6321.json | 6 +- CVE-2024/CVE-2024-63xx/CVE-2024-6334.json | 8 +- CVE-2024/CVE-2024-63xx/CVE-2024-6365.json | 8 +- CVE-2024/CVE-2024-63xx/CVE-2024-6391.json | 4 +- CVE-2024/CVE-2024-64xx/CVE-2024-6409.json | 4 +- CVE-2024/CVE-2024-65xx/CVE-2024-6527.json | 4 +- CVE-2024/CVE-2024-65xx/CVE-2024-6580.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6598.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6600.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6601.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6602.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6603.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6604.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6605.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6606.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6607.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6608.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6609.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6610.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6611.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6612.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6613.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6614.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6615.json | 4 +- README.md | 110 +-- _state.csv | 937 ++++++++++---------- 440 files changed, 5290 insertions(+), 2246 deletions(-) create mode 100644 CVE-2023/CVE-2023-481xx/CVE-2023-48194.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50805.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50806.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50807.json create mode 100644 CVE-2024/CVE-2024-271xx/CVE-2024-27183.json create mode 100644 CVE-2024/CVE-2024-273xx/CVE-2024-27360.json create mode 100644 CVE-2024/CVE-2024-273xx/CVE-2024-27362.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28067.json create mode 100644 CVE-2024/CVE-2024-319xx/CVE-2024-31957.json create mode 100644 CVE-2024/CVE-2024-341xx/CVE-2024-34123.json create mode 100644 CVE-2024/CVE-2024-378xx/CVE-2024-37870.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38517.json create mode 100644 CVE-2024/CVE-2024-389xx/CVE-2024-38970.json create mode 100644 CVE-2024/CVE-2024-389xx/CVE-2024-38971.json create mode 100644 CVE-2024/CVE-2024-389xx/CVE-2024-38972.json create mode 100644 CVE-2024/CVE-2024-396xx/CVE-2024-39684.json create mode 100644 CVE-2024/CVE-2024-396xx/CVE-2024-39698.json create mode 100644 CVE-2024/CVE-2024-398xx/CVE-2024-39897.json create mode 100644 CVE-2024/CVE-2024-398xx/CVE-2024-39899.json create mode 100644 CVE-2024/CVE-2024-400xx/CVE-2024-40034.json create mode 100644 CVE-2024/CVE-2024-400xx/CVE-2024-40035.json create mode 100644 CVE-2024/CVE-2024-400xx/CVE-2024-40036.json create mode 100644 CVE-2024/CVE-2024-400xx/CVE-2024-40037.json create mode 100644 CVE-2024/CVE-2024-400xx/CVE-2024-40038.json create mode 100644 CVE-2024/CVE-2024-400xx/CVE-2024-40039.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40726.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40727.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40728.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40729.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40730.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40731.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40732.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40733.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40734.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40735.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40736.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40737.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40738.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40739.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40740.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40741.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40742.json create mode 100644 CVE-2024/CVE-2024-62xx/CVE-2024-6222.json diff --git a/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json b/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json index 09e110358f4..f8425afe77a 100644 --- a/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json +++ b/CVE-2010/CVE-2010-43xx/CVE-2010-4398.json @@ -2,8 +2,9 @@ "id": "CVE-2010-4398", "sourceIdentifier": "cve@mitre.org", "published": "2010-12-06T13:44:54.863", - "lastModified": "2018-10-12T21:59:03.130", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:24:01.497", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-21", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -66,48 +89,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", - "matchCriteriaId": "60EC86B8-5C8C-4873-B364-FB1F8EFE1CFF" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", - "matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", - "matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", - "matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", - "matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", - "matchCriteriaId": "CC916D5A-0644-4423-A52E-D4310906BE78" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", - "matchCriteriaId": "95DC297F-06DB-4FB3-BFB6-7312C059E047" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", - "matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -117,67 +140,107 @@ "references": [ { "url": "http://isc.sans.edu/diary.html?storyid=9988", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/42356", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://support.avaya.com/css/P8/documents/100127248", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://twitter.com/msftsecresponse/statuses/7590788200402945", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.exploit-db.com/exploits/15609/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.kb.cert.org/vuls/id/529673", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/bid/45045", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1025046", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0324", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12162", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json index 98b3de3b202..f86a663e225 100644 --- a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json +++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json @@ -2,8 +2,9 @@ "id": "CVE-2011-2005", "sourceIdentifier": "secure@microsoft.com", "published": "2011-10-12T02:52:43.910", - "lastModified": "2019-02-26T14:04:00.993", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:23:38.187", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "NVD-CWE-noinfo" } ] } @@ -66,23 +89,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -92,11 +110,18 @@ "references": [ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-080", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13114", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-05xx/CVE-2012-0518.json b/CVE-2012/CVE-2012-05xx/CVE-2012-0518.json index 45ba0bb9443..36359cdbf33 100644 --- a/CVE-2012/CVE-2012-05xx/CVE-2012-0518.json +++ b/CVE-2012/CVE-2012-05xx/CVE-2012-0518.json @@ -2,8 +2,9 @@ "id": "CVE-2012-0518", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-10-16T23:55:03.087", - "lastModified": "2016-11-28T19:07:49.820", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:26:11.997", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-601" } ] } @@ -77,7 +100,10 @@ "references": [ { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2539.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2539.json index 690eddfac1d..5a9f35efca6 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2539.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2539.json @@ -2,8 +2,9 @@ "id": "CVE-2012-2539", "sourceIdentifier": "secure@microsoft.com", "published": "2012-12-12T00:55:01.060", - "lastModified": "2018-10-12T22:03:08.390", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:23:09.950", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-787" } ] } @@ -66,13 +89,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "AED6C159-CD2C-436B-99BC-00E79A685D44" + "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "55AA5CC4-AF80-49A2-ACD1-5644AA971044" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "44BC7B7B-7191-431C-8CAE-83B3F0EFF03E" + "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "71AF058A-2E5D-4B11-88DB-8903C64B13C1" }, { "vulnerable": true, @@ -81,8 +104,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*", - "matchCriteriaId": "E647A7B3-7A92-4584-BDA7-81752FF59411" + "criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*", + "matchCriteriaId": "DCBCB0A0-BC40-4E6B-BD06-A137BB964B7F" }, { "vulnerable": true, @@ -114,16 +142,24 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA12-346A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-079", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16073", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json index d658c5ffb9b..f64fef0e352 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json @@ -2,8 +2,9 @@ "id": "CVE-2013-1690", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.793", - "lastModified": "2017-09-19T01:36:10.950", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:25:57.940", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -67,124 +90,28 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndIncluding": "21.0", - "matchCriteriaId": "29071754-CC8F-42D9-82D4-140236802506" + "versionEndExcluding": "22.0", + "matchCriteriaId": "B0321165-FB26-4E37-B9EC-E09FF46034B4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*", - "matchCriteriaId": "06FF9DFE-491D-4260-8A49-07FD342B9412" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.0.7", + "matchCriteriaId": "C598E3DF-1B51-4FFC-8B05-D9BEF244AACA" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DE09D089-7F48-466B-B03A-C64152A12615" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "653D73DA-21C0-4C3F-9269-5A6D5C5B1E34" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*", - "matchCriteriaId": "804A0ACE-EB28-413D-93F4-E849FEA01390" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3BA49C6F-9115-41A5-BBDE-743CB9DEDDA8" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", - "versionEndIncluding": "17.0.6", - "matchCriteriaId": "5C8122DC-6877-4EC8-8041-B579FC5AC6CA" + "versionEndExcluding": "17.0.7", + "matchCriteriaId": "945D0C7E-E76B-4E80-A78E-8FC59E0579E6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C2FD78A8-0D3A-412C-8776-20C598697564" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "777D8DC5-8D43-4842-B0A7-3C933F41F6E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "808C66D2-4C53-4544-AD21-443D9A400B84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6FB95E8B-CF01-471F-8306-BB9FB0896904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "AF7E092E-BCBE-48B4-8F6A-D3E4A0369AE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "BB1D90B0-9E81-4828-8122-A66FB0953863" + "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.0.7", + "matchCriteriaId": "D30B82F9-F16D-48C8-BFC4-1F4FA628B9E2" } ] } @@ -198,38 +125,183 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "341D94CE-C0EB-47FA-A043-E7B0F4344BBB" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", + "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "84C3EE07-F201-451A-89A1-A41B8B2165E6" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", + "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "45837B42-7D29-4475-94F1-E29CD5831C7F" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", + "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "59D47E43-886E-4114-96A2-DBE719EA3A89" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7028A433-7D1B-4C6F-A0F6-1B69682F7853" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "86C07513-8F98-4FA6-837D-7D735AE5EA91" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E1D87C70-0EC2-49DE-A59D-CAF22760BC9D" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "61AE2EAA-55A4-4FC9-BC3F-0FEE5BB2DE99" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", + "matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", + "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", + "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*", + "matchCriteriaId": "D1D7B467-58DD-45F1-9F1F-632620DF072A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*", + "matchCriteriaId": "7F4AF9EC-7C74-40C3-A1BA-82B80C4A7EE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:vmware:*:*", + "matchCriteriaId": "DB9BBC2E-7D91-4879-898A-520D2D758D1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", + "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", + "matchCriteriaId": "DB4D6749-81A1-41D7-BF4F-1C45A7F49A22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", + "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", + "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", + "matchCriteriaId": "436EF2ED-FDBB-4B64-8EC4-33C3E4253F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026" } ] } @@ -239,43 +311,81 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-0981.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-0982.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2013/dsa-2716", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2013/dsa-2720", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-53.html", @@ -286,27 +396,47 @@ }, { "url": "http://www.securityfocus.com/bid/60778", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-1890-1", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-1891-1", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=857883", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=901365", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16996", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-25xx/CVE-2013-2551.json b/CVE-2013/CVE-2013-25xx/CVE-2013-2551.json index 7f0296f9e8f..211a7a75b5b 100644 --- a/CVE-2013/CVE-2013-25xx/CVE-2013-2551.json +++ b/CVE-2013/CVE-2013-25xx/CVE-2013-2551.json @@ -2,8 +2,9 @@ "id": "CVE-2013-2551", "sourceIdentifier": "cve@mitre.org", "published": "2013-03-11T10:55:01.070", - "lastModified": "2018-10-12T22:04:23.617", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:22:54.570", + "vulnStatus": "Analyzed", + "cveTags": [], "evaluatorComment": "CWE 416 User-after-free \n\nhttp://cwe.mitre.org/data/definitions/416.html", "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", @@ -20,6 +21,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -60,6 +83,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -69,28 +93,222 @@ "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", - "matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360" + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*", + "matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + } + ] } ] } @@ -100,6 +318,7 @@ "url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -114,7 +333,7 @@ "url": "http://twitter.com/thezdi/statuses/309452625173176320", "source": "cve@mitre.org", "tags": [ - "Press/Media Coverage" + "Not Applicable" ] }, { @@ -127,11 +346,18 @@ }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-037", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16317", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-27xx/CVE-2013-2729.json b/CVE-2013/CVE-2013-27xx/CVE-2013-2729.json index 528b1ece9f2..065cf28cf0e 100644 --- a/CVE-2013/CVE-2013-27xx/CVE-2013-2729.json +++ b/CVE-2013/CVE-2013-27xx/CVE-2013-2729.json @@ -2,8 +2,9 @@ "id": "CVE-2013-2729", "sourceIdentifier": "psirt@adobe.com", "published": "2013-05-16T11:45:31.263", - "lastModified": "2017-09-19T01:36:25.733", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:22:32.587", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -66,123 +89,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.5.5", + "matchCriteriaId": "413B5753-2B8D-44F6-B3A3-3CB4C9E8B68E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndExcluding": "10.1.7", + "matchCriteriaId": "46FE52E1-6878-41E8-9898-B0C93DB1A711" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "11.0.03", + "matchCriteriaId": "64498BAE-6B93-4171-987C-DA0D7E5586B6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.5.5", + "matchCriteriaId": "59FB20F5-387E-4DB3-A2D5-E027C678B771" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndExcluding": "10.1.7", + "matchCriteriaId": "085F0347-0232-481A-8275-E19A9A0631AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "CB6F49FE-2332-4CAF-A11D-CDE46A71447F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5D0D8BBD-F727-4957-8128-10A4C456FBD0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C107680A-DC95-454D-9315-9223A803A0EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "196213BA-0A50-4D0C-A959-EF9F8EB92095" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "53433777-A33B-4265-96EE-36DC935ACB00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D1DDDCC9-EC55-42D4-8116-4D60BC3E8749" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "FCDF625D-358F-4359-897A-0188CCD20AD8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "5083821C-7D10-43E9-ACAC-19C43F7B6D26" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "11.0.03", + "matchCriteriaId": "847908BF-1CD9-485F-93D7-5EB600DD7220" } ] } @@ -196,58 +141,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C" + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", + "matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "366E85EF-ED5F-4D4D-9CBE-E69F7248CB2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "56C05D36-1343-4571-9886-E1AE8952E096" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5FBE0589-567D-4440-A51F-4EEC0A29DD44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "823940EF-8B5F-44B0-8C74-2290A39DD15B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B6944168-B6E8-4267-AE42-6E926B9CCB56" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "35D7E162-657C-4E1A-B394-80E457B3E366" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A2F7EC9A-2CD6-4C75-8D2C-F48F1ACCEFF0" + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", + "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399" } ] } @@ -261,323 +161,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3597B29D-1871-460A-A128-86C6BB777F36" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E72C3C61-511E-4977-B029-70277C68E24D" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "47478166-EE66-4837-A6C0-0A519F9EDD26" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*", - "matchCriteriaId": "E5A5A316-88A0-4C32-A05A-1EDC74831731" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", + "matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*", - "matchCriteriaId": "BCF823BA-69E2-4BFA-A779-5652B98B8403" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*", - "matchCriteriaId": "D6928580-8A0C-40C8-9FCA-452BFAC86390" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*", - "matchCriteriaId": "27511A34-2631-4461-A361-F1073820BE08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*", - "matchCriteriaId": "FA6471B0-C717-4ED5-9726-AE01FE5FEBE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*", - "matchCriteriaId": "54510A26-9F44-413B-AA65-828438192AB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*", - "matchCriteriaId": "1998E572-FB0D-4F37-98FD-5D5B50D04FED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*", - "matchCriteriaId": "FC6758E8-474A-4D64-AB29-DF484F3EE6AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*", - "matchCriteriaId": "9F28D056-FBD4-4220-8326-BA4D6FFB193C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*", - "matchCriteriaId": "361B2A72-9C21-4D71-A04D-5C68E1B947E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*", - "matchCriteriaId": "3563311C-2685-4A43-9D3D-A747A9851676" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*", - "matchCriteriaId": "C2A630C3-6CC0-409E-B77C-D0AA2DBD482B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*", - "matchCriteriaId": "51589BA6-E573-45FE-B778-D778AD049F59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "958768B5-ABA3-4843-986D-499AD480832B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*", - "matchCriteriaId": "31278B7A-954C-4C44-8422-197C8E8C2F0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0335CEAA-ED55-46AA-98D9-693733CDA68C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*", - "matchCriteriaId": "39E332C3-6ABF-4BFE-9C27-7D581BD286AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "314014C8-527A-4D6D-B9BF-30084178C9B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D12CA81D-6CDD-4FB4-8DE2-004D783BADE0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6AF167B4-0D05-490A-9A11-0447D8AA441B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E0673141-9FA2-4C20-A224-0F46F8CB2F9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BD194E0C-6699-4927-AC72-4D3339AF2AE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "BEB429B0-E3E1-41F1-9B75-C0A60E38F23F" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*", - "matchCriteriaId": "353F77A1-E19C-4126-A10C-5A86B5C36E56" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*", - "matchCriteriaId": "D57B9AEA-000B-49BF-BDBF-1CC7642F837A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D3CA4B45-E643-4705-9B6C-8598A5357326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ADD314C8-A849-46C6-9ADD-72A2DF4C3219" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9EFDECFD-E02F-4545-939B-8C18A0BD82A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0D1565F5-8627-445B-AC76-662C08F215D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B10B4387-A6DB-4563-843E-0CF50F6293E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D917DF13-8582-455E-A8E6-3334F36553A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "04E4C131-8681-4A7E-B4E1-A9E44FBFB29D" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", - "matchCriteriaId": "10D5B006-F8CD-4B51-A5B6-A282C95C6C19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "51C67ABD-5800-46DD-9E81-2A586698BC90" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9FF4675-A9FF-4B0F-BBC6-D29B6324D27D" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" } ] } @@ -587,27 +202,41 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html", "source": "psirt@adobe.com", "tags": [ + "Not Applicable", "Patch", "Vendor Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16717", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json b/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json index 8df15518f5f..8b76691cdb3 100644 --- a/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json +++ b/CVE-2013/CVE-2013-36xx/CVE-2013-3660.json @@ -2,8 +2,9 @@ "id": "CVE-2013-3660", "sourceIdentifier": "cve@mitre.org", "published": "2013-05-24T20:55:01.903", - "lastModified": "2019-02-26T14:04:02.353", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:25:48.790", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -66,28 +89,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", - "matchCriteriaId": "976EFC05-9B37-4661-AD34-4FFDB5AB48E0" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*", - "matchCriteriaId": "9DAA2E6F-A666-4136-8F6B-E35C313CAB2B" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" + "criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", - "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "vulnerable": true, @@ -96,18 +124,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -117,20 +145,30 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/53435", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -143,45 +181,71 @@ }, { "url": "http://twitter.com/taviso/statuses/335557286657400832", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.computerworld.com/s/article/9239477", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.exploit-db.com/exploits/25611/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.osvdb.org/93539", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "http://www.us-cert.gov/ncas/alerts/TA13-190A", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json index 2e7907bf71d..2d908d91ae1 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json @@ -2,8 +2,9 @@ "id": "CVE-2015-1770", "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:36.483", - "lastModified": "2018-10-12T22:09:12.167", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:27:09.967", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-19" + "value": "CWE-824" } ] } @@ -66,13 +89,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_2013:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "7E3DBA2E-2F97-4FFA-B018-AC2D36067783" + "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*", + "matchCriteriaId": "552E1557-D6FA-45DD-9B52-E13ACDBB8A62" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_2013:rt:sp1:*:*:*:*:*:*", - "matchCriteriaId": "E0447635-86B1-4CA0-80A3-BC21F68C7E48" + "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", + "matchCriteriaId": "F7DDFFB8-2337-4DD7-8120-56CC8EF134B4" } ] } @@ -82,15 +105,29 @@ "references": [ { "url": "http://www.securityfocus.com/bid/75016", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1032523", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-059", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json index 7733c9f6562..8d9582fbafe 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json @@ -2,8 +2,9 @@ "id": "CVE-2015-2419", "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:33.283", - "lastModified": "2018-10-12T22:09:26.497", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:24:22.617", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,13 +75,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -68,13 +92,86 @@ "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] } ] } @@ -82,11 +179,20 @@ "references": [ { "url": "http://www.securitytracker.com/id/1032894", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json index c376c923500..5f6d4705d26 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json @@ -2,8 +2,9 @@ "id": "CVE-2016-0040", "sourceIdentifier": "secure@microsoft.com", "published": "2016-02-10T11:59:06.440", - "lastModified": "2018-10-12T22:10:50.127", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:21:38.900", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,17 +20,17 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", @@ -73,7 +74,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "NVD-CWE-noinfo" } ] } @@ -87,13 +88,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", - "matchCriteriaId": "F282E5E8-A5C9-4092-B0BF-07A5A2CAA6F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", - "matchCriteriaId": "D16A8D29-57BF-4B74-85F2-24DBD8B52BBF" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, @@ -118,15 +114,29 @@ "references": [ { "url": "http://www.securitytracker.com/id/1034985", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/44586/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json index 7521a2986b6..0a275fc83ed 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json @@ -2,8 +2,9 @@ "id": "CVE-2016-0151", "sourceIdentifier": "secure@microsoft.com", "published": "2016-04-12T23:59:15.890", - "lastModified": "2018-10-12T22:11:19.723", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:25:19.620", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,17 +20,17 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "NVD-CWE-noinfo" } ] } @@ -88,18 +89,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", - "matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", - "matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": true, @@ -126,16 +127,27 @@ "url": "http://www.securitytracker.com/id/1035544", "source": "secure@microsoft.com", "tags": [ - "Third Party Advisory" + "Broken Link", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-048", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/39740/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json index 5c380602f7d..dedcad64157 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json @@ -2,8 +2,9 @@ "id": "CVE-2016-0189", "sourceIdentifier": "secure@microsoft.com", "published": "2016-05-11T01:59:30.537", - "lastModified": "2018-10-12T22:11:30.600", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:25:02.227", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -83,27 +84,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", - "matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", - "matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*", - "matchCriteriaId": "15BAAA8C-7AF1-46CE-9FFB-3A498508A1BF" - } - ] - }, { "operator": "OR", "negate": false, @@ -124,6 +104,165 @@ "matchCriteriaId": "1C94EA55-F0DE-4A45-A020-9F7FE2A3745B" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*", + "matchCriteriaId": "0061E11D-9293-401A-BA38-85AD0C4A04E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", + "matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", + "matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", + "matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] } ] } @@ -131,27 +270,53 @@ "references": [ { "url": "http://www.securityfocus.com/bid/90012", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1035820", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-053", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/40118/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-72xx/CVE-2016-7200.json b/CVE-2016/CVE-2016-72xx/CVE-2016-7200.json index 7d235c89ec2..27c405ace50 100644 --- a/CVE-2016/CVE-2016-72xx/CVE-2016-7200.json +++ b/CVE-2016/CVE-2016-72xx/CVE-2016-7200.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7200", "sourceIdentifier": "secure@microsoft.com", "published": "2016-11-10T06:59:15.733", - "lastModified": "2018-10-12T22:14:09.140", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:21:29.017", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,25 +20,25 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ], @@ -74,13 +75,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -88,8 +90,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8BD5B232-95EA-4F8E-8C7D-7976877AD243" + "criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:*:*:x64:*", + "matchCriteriaId": "3E6083A1-78C4-4ED9-A80A-41483D47ADC0" } ] } @@ -99,31 +127,61 @@ "references": [ { "url": "http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/93968", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1037245", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-129", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/theori-io/chakra-2016-11", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/40785/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/40990/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-72xx/CVE-2016-7201.json b/CVE-2016/CVE-2016-72xx/CVE-2016-7201.json index b02660aaa18..b7bd741f40a 100644 --- a/CVE-2016/CVE-2016-72xx/CVE-2016-7201.json +++ b/CVE-2016/CVE-2016-72xx/CVE-2016-7201.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7201", "sourceIdentifier": "secure@microsoft.com", "published": "2016-11-10T06:59:16.810", - "lastModified": "2018-10-12T22:14:09.703", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:21:10.773", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,25 +20,25 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ], @@ -74,13 +75,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-843" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -88,8 +90,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8BD5B232-95EA-4F8E-8C7D-7976877AD243" + "criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" } ] } @@ -99,31 +127,62 @@ "references": [ { "url": "http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/94038", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1037245", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-129", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/theori-io/chakra-2016-11", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/40784/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/40990/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0148.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0148.json index 69d99c2ad93..15731b96620 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0148.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0148.json @@ -2,8 +2,9 @@ "id": "CVE-2017-0148", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:04.150", - "lastModified": "2018-06-21T01:29:00.730", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:28:14.240", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-04-06", "cisaActionDue": "2022-04-27", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -100,18 +101,18 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", - "matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", - "matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": false, @@ -120,8 +121,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", - "matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": false, @@ -140,8 +141,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*", - "matchCriteriaId": "AB506484-7F0C-46BF-8EA6-4FB5AF454CED" + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "vulnerable": false, @@ -161,51 +162,347 @@ ] } ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*", + "matchCriteriaId": "0814F7B8-8022-4DCC-BE37-4868EB912881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*", + "matchCriteriaId": "87A45473-9558-4165-949B-D63F1486F28E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*", + "matchCriteriaId": "59E3D131-8FDF-424C-9BBA-41FDAE43F24C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*", + "matchCriteriaId": "2C270FA0-6961-4181-8388-E609DAEADC09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C07C8A47-9E8F-42E4-BB35-64590853A9C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*", + "matchCriteriaId": "506F5373-3C3C-4F47-8FC0-D5F04095B324" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*", + "matchCriteriaId": "42DBCB0C-2C71-4427-ADF8-FCB4920609B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C50335A-8742-4E2B-B22D-0ED0A0DFB5C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.0e", + "matchCriteriaId": "D4CFBFA2-BDE4-4566-A435-92BFB87C48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*", + "matchCriteriaId": "7DFBC156-20D1-4546-948F-A2118D602137" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70575FD4-0A0A-4D11-9069-F808D9F00D10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B1E644CD-EA9B-45B5-A7C6-5F294D8A6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4F38DAB6-39E2-4048-A57D-C3EB8415F3F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05BD2983-B780-46F0-A857-CFC614D1B524" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndIncluding": "4.0e", + "matchCriteriaId": "31FE05B1-0B85-424F-9F30-14BFCB2ED15D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*", + "matchCriteriaId": "1753DB4B-1F5A-4193-A50C-C2A576F0884C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25CEAC4F-CBA5-41BA-B389-4D0DA3F85B59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6DE83393-E735-42BC-86E9-5DAF9F403C73" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5641B967-9938-4148-90C4-D92C3E757847" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "582D4D5C-D0F1-403D-8687-3F1491943A65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68FE5E09-78BB-4A22-9CAA-93ECD7AC33A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AA7B7CC4-E89E-4357-A7D6-AF74480F46B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41EF3913-CD35-49FD-90D8-62228DB1390C" + } + ] + } + ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/96706", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1037991", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0148", "source": "secure@microsoft.com", "tags": [ + "Patch", "Vendor Advisory" ] }, { "url": "https://www.exploit-db.com/exploits/41891/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/41987/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-02xx/CVE-2017-0213.json b/CVE-2017/CVE-2017-02xx/CVE-2017-0213.json index 1315efd6cda..3f0405c1377 100644 --- a/CVE-2017/CVE-2017-02xx/CVE-2017-0213.json +++ b/CVE-2017/CVE-2017-02xx/CVE-2017-0213.json @@ -2,8 +2,9 @@ "id": "CVE-2017-0213", "sourceIdentifier": "secure@microsoft.com", "published": "2017-05-12T14:29:01.393", - "lastModified": "2019-10-03T00:03:26.223", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:24:42.860", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,26 +20,26 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "LOW", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 4.7, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.0, - "impactScore": 3.6 + "exploitabilityScore": 1.3, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -88,48 +89,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", - "matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "7519928D-0FF2-4584-8058-4C7764CD5671" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", - "matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", - "matchCriteriaId": "197E82CB-81AF-40F1-A55C-7B596891A783" + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", - "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "vulnerable": true, @@ -143,8 +144,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", - "matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" } ] } @@ -156,13 +157,19 @@ "url": "http://www.securityfocus.com/bid/98102", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1038457", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0213", @@ -174,7 +181,12 @@ }, { "url": "https://www.exploit-db.com/exploits/42020/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json b/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json index 3560bf45ecc..2ff0d34cd86 100644 --- a/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json +++ b/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json @@ -2,8 +2,9 @@ "id": "CVE-2021-21551", "sourceIdentifier": "security_alert@emc.com", "published": "2021-05-04T16:15:07.867", - "lastModified": "2023-10-05T06:15:09.290", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:27:32.497", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-31", "cisaActionDue": "2022-04-21", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -89,22 +90,22 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-782" + "value": "NVD-CWE-Other" } ] }, { - "source": "nvd@nist.gov", + "source": "security_alert@emc.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-782" } ] } diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31166.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31166.json index 6dcf8a21c8b..09601d68245 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31166.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31166.json @@ -2,8 +2,9 @@ "id": "CVE-2021-31166", "sourceIdentifier": "secure@microsoft.com", "published": "2021-05-11T19:15:09.300", - "lastModified": "2023-08-02T00:15:11.973", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:28:03.397", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-04-06", "cisaActionDue": "2022-04-27", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -108,23 +109,27 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.982", + "matchCriteriaId": "F170C517-0312-457D-9108-ECA6638C8223" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.982", + "matchCriteriaId": "957F366C-FD59-479A-A6C5-F93E35436549" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.982", + "matchCriteriaId": "BD0A39ED-F4B4-4C2D-BDB4-088426F2377B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82" + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.982", + "matchCriteriaId": "F42A77A0-2B44-4C08-8BBB-851B22AED6E8" } ] } diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json index 375baae448e..f159f49eda2 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json @@ -2,8 +2,9 @@ "id": "CVE-2021-3156", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-26T21:15:12.987", - "lastModified": "2024-02-04T09:15:08.010", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:27:53.967", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-04-06", "cisaActionDue": "2022-04-27", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -160,6 +161,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", @@ -170,6 +181,16 @@ "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A4D418D-B526-46B9-B439-E1963BF88C0A" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", @@ -232,9 +253,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D0A88A76-CF8A-4D29-B480-E5317219072D" + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53EF087B-D7E9-4F9A-803A-B0260C495C67" } ] }, @@ -243,9 +264,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "53EF087B-D7E9-4F9A-803A-B0260C495C67" + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0A88A76-CF8A-4D29-B480-E5317219072D" } ] } @@ -259,9 +280,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130" + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C" } ] }, @@ -270,9 +291,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C" + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130" } ] } @@ -308,9 +329,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:oracle:micros_compact_workstation_3:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA4F0AD-B8A4-4EB9-A220-FEEC9B147D3C" + "vulnerable": true, + "criteria": "cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*", + "matchCriteriaId": "1CE3FF32-E472-4E90-9DE5-803AD6FD9E27" } ] }, @@ -319,9 +340,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*", - "matchCriteriaId": "1CE3FF32-E472-4E90-9DE5-803AD6FD9E27" + "vulnerable": false, + "criteria": "cpe:2.3:h:oracle:micros_compact_workstation_3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DA4F0AD-B8A4-4EB9-A220-FEEC9B147D3C" } ] } @@ -330,17 +351,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:oracle:micros_es400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A2BBD07A-4731-41D1-AB66-77082951D99C" - } - ] - }, { "operator": "OR", "negate": false, @@ -353,23 +363,23 @@ "matchCriteriaId": "9AA5297B-05DF-4A23-B684-60F2107339B0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:oracle:micros_kitchen_display_system:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D1424AF8-9337-427B-B6FA-C5EB8B201FB7" + "criteria": "cpe:2.3:h:oracle:micros_es400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2BBD07A-4731-41D1-AB66-77082951D99C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -380,6 +390,17 @@ "matchCriteriaId": "57E6A365-F04F-4991-888F-D8E9391A9857" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:oracle:micros_kitchen_display_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1424AF8-9337-427B-B6FA-C5EB8B201FB7" + } + ] } ] }, @@ -391,9 +412,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:oracle:micros_workstation_5a:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F607BA3F-246F-42BE-9EBD-A2CAE098C0C2" + "vulnerable": true, + "criteria": "cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*", + "matchCriteriaId": "C78FDD3A-F241-4172-8725-7D51D8E705E7" } ] }, @@ -402,9 +423,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*", - "matchCriteriaId": "C78FDD3A-F241-4172-8725-7D51D8E705E7" + "vulnerable": false, + "criteria": "cpe:2.3:h:oracle:micros_workstation_5a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F607BA3F-246F-42BE-9EBD-A2CAE098C0C2" } ] } @@ -476,6 +497,7 @@ "url": "http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html", "source": "cve@mitre.org", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] @@ -509,7 +531,12 @@ }, { "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Feb/42", @@ -530,7 +557,12 @@ }, { "url": "http://seclists.org/fulldisclosure/2024/Feb/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2021/01/26/3", @@ -577,16 +609,24 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/30/6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/30/8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10348", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -600,11 +640,19 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202101-33", @@ -645,7 +693,6 @@ "url": "https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability", "source": "cve@mitre.org", "tags": [ - "Patch", "Third Party Advisory" ] }, @@ -701,8 +748,7 @@ "url": "https://www.sudo.ws/stable.html#1.9.5p2", "source": "cve@mitre.org", "tags": [ - "Release Notes", - "Vendor Advisory" + "Release Notes" ] }, { diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34484.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34484.json index bf4f733d186..746ce72ec8c 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34484.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34484.json @@ -2,8 +2,9 @@ "id": "CVE-2021-34484", "sourceIdentifier": "secure@microsoft.com", "published": "2021-08-12T18:15:09.117", - "lastModified": "2023-12-28T20:15:48.487", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:27:20.330", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-03-31", "cisaActionDue": "2022-04-21", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -94,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-noinfo" } ] } @@ -108,38 +109,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19022", + "matchCriteriaId": "591E8C5B-1BA2-4542-B477-2742456AE766" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.4583", + "matchCriteriaId": "13B252F6-CA16-41C8-804D-DF6863493170" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2114", + "matchCriteriaId": "F8D40D82-1D88-4CF1-B961-F9F28426C56B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.18363.1734", + "matchCriteriaId": "3DD2BDE6-67C6-48E2-BED0-12E4CC7EE6BC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.1165", + "matchCriteriaId": "70336A6A-DE45-4604-BE81-10DA4DF12D3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1165", + "matchCriteriaId": "7AB7321A-1F89-48B3-8E5A-94791AB2BC86" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.1165", + "matchCriteriaId": "2A860F2B-0533-46F7-879E-B932E4E44F0D" }, { "vulnerable": true, @@ -156,6 +164,12 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.1165", + "matchCriteriaId": "C90BEC5F-E0A8-43C5-BB0D-251D19BFD66B" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -178,23 +192,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.4583", + "matchCriteriaId": "11769DC8-BD9F-4526-8B53-5380327930FB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2114", + "matchCriteriaId": "61219C24-A1AE-427F-BBF8-A984BCB1CA6F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1165", + "matchCriteriaId": "45A85E4C-6C7A-4B72-832D-AC12A78565C3" } ] } diff --git a/CVE-2021/CVE-2021-422xx/CVE-2021-42287.json b/CVE-2021/CVE-2021-422xx/CVE-2021-42287.json index f40d5d382de..790d2b7b97a 100644 --- a/CVE-2021/CVE-2021-422xx/CVE-2021-42287.json +++ b/CVE-2021/CVE-2021-422xx/CVE-2021-42287.json @@ -2,8 +2,9 @@ "id": "CVE-2021-42287", "sourceIdentifier": "secure@microsoft.com", "published": "2021-11-10T01:19:46.137", - "lastModified": "2023-12-28T16:15:56.857", - "vulnStatus": "Modified", + "lastModified": "2024-07-09T18:28:30.367", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-04-11", "cisaActionDue": "2022-05-02", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -94,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-noinfo" } ] } @@ -108,13 +109,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", - "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, @@ -133,8 +129,9 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.4770", + "matchCriteriaId": "572BDEFC-D3E8-4FF0-B91E-D21F42D2B82D" }, { "vulnerable": true, @@ -143,13 +140,15 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2300", + "matchCriteriaId": "74A5AF5D-C59C-4093-A4C0-3BE230E7637F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", - "matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D" + "versionEndExcluding": "10.0.20348.350", + "matchCriteriaId": "B662E504-15E6-4D85-8463-BBE9435790CC" } ] } diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45147.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45147.json index 9145647076f..09787e91d90 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45147.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45147.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45147", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:08.830", - "lastModified": "2024-07-09T12:15:08.830", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32735.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32735.json index 307ae0f0e85..9b123bd7c7d 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32735.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32735.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32735", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:09.347", - "lastModified": "2024-07-09T12:15:09.347", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32737.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32737.json index 924f8ff7bb9..8175e4b8756 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32737.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32737.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32737", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:09.627", - "lastModified": "2024-07-09T12:15:09.627", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3285.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3285.json index 4e04f896552..46828be9833 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3285.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3285.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3285", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T10:15:02.380", - "lastModified": "2024-07-09T10:15:02.380", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3286.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3286.json index de26cd674ae..75d2f773f1e 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3286.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3286.json @@ -2,13 +2,17 @@ "id": "CVE-2023-3286", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:12.207", - "lastModified": "2024-07-09T11:15:12.207", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in POST /secretaries allows a low privileged user to create a low privileged user (secretary) in the system. This results in unauthorized data manipulation." + }, + { + "lang": "es", + "value": "Una vulnerabilidad BOLA en POST /secretarias permite a un usuario con pocos privilegios crear un usuario con pocos privilegios (secretaria) en el sistema. Esto da como resultado una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3287.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3287.json index f2f1d9b0d44..d2b627d465c 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3287.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3287.json @@ -2,13 +2,17 @@ "id": "CVE-2023-3287", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:12.397", - "lastModified": "2024-07-09T11:15:12.397", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in POST /admins allows a low privileged user to create a high privileged user (admin) in the system. This results in privilege escalation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en POST /admins permite que un usuario con pocos privilegios cree un usuario con altos privilegios (administrador) en el sistema. Esto da como resultado una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3288.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3288.json index aa6d003f2a5..9d380dcdb74 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3288.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3288.json @@ -2,13 +2,17 @@ "id": "CVE-2023-3288", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:12.600", - "lastModified": "2024-07-09T11:15:12.600", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in POST /providers allows a low privileged user to create a privileged user (provider) in the system. This results in privilege escalation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en POST /providers permite a un usuario con pocos privilegios crear un usuario privilegiado (proveedor) en el sistema. Esto da como resultado una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3289.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3289.json index 5ad3bacee00..3b593a3acde 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3289.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3289.json @@ -2,13 +2,17 @@ "id": "CVE-2023-3289", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:12.787", - "lastModified": "2024-07-09T11:15:12.787", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in POST /services allows a low privileged user to create a service for any user in the system (including admin). This results in unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en POST /services permite a un usuario con pocos privilegios crear un servicio para cualquier usuario del sistema (incluido el administrador). Esto da como resultado una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3290.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3290.json index 8c94690d1a4..6fce321d1bd 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3290.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3290.json @@ -2,13 +2,17 @@ "id": "CVE-2023-3290", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:12.987", - "lastModified": "2024-07-09T11:15:12.987", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en POST /customers permite a un usuario con pocos privilegios crear un usuario con pocos privilegios (cliente) en el sistema. Esto da como resultado una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38047.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38047.json index 04c23292420..5f37f72a4fd 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38047.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38047.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38047", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:10.333", - "lastModified": "2024-07-09T11:15:10.333", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /categories/{categoryId} allows a low privileged user to fetch, modify or delete the category of any user (including admin). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": "Una vulnerabilidad BOLA en GET, PUT, DELETE /categories/{categoryId} permite a un usuario con pocos privilegios buscar, modificar o eliminar la categor\u00eda de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38048.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38048.json index 54fba098f0e..1f59918d553 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38048.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38048.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38048", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:10.600", - "lastModified": "2024-07-09T11:15:10.600", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /providers/{providerId} allows a low privileged user to fetch, modify or delete a privileged user (provider). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": "Una vulnerabilidad BOLA en GET, PUT, DELETE /providers/{providerId} permite a un usuario con pocos privilegios buscar, modificar o eliminar un usuario privilegiado (proveedor). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38049.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38049.json index be6402d99ea..5dd2c539530 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38049.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38049.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38049", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:10.820", - "lastModified": "2024-07-09T11:15:10.820", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /appointments/{appointmentId} allows a low privileged user to fetch, modify or delete an appointment of any user (including admin). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /appointments/{appointmentId} permite a un usuario con pocos privilegios buscar, modificar o eliminar una cita de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38050.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38050.json index 4941695fbcd..e58586656b1 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38050.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38050.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38050", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:11.017", - "lastModified": "2024-07-09T11:15:11.017", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /webhooks/{webhookId} permite a un usuario con pocos privilegios recuperar, modificar o eliminar un webhook de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38051.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38051.json index 455f72fe3e6..c6cd14b26d9 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38051.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38051.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38051", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:11.217", - "lastModified": "2024-07-09T11:15:11.217", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /secretaries/{secretaryId} allows a low privileged user to fetch, modify or delete a low privileged user (secretary). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /secretaries/{secretaryId} permite a un usuario con pocos privilegios buscar, modificar o eliminar a un usuario con pocos privilegios (secretaria). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38052.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38052.json index 02d5e20072c..30432084858 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38052.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38052.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38052", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:11.413", - "lastModified": "2024-07-09T11:15:11.413", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /admins/{adminId} allows a low privileged user to fetch, modify or delete a high privileged user (admin). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": "Una vulnerabilidad BOLA en GET, PUT, DELETE /admins/{adminId} permite a un usuario con pocos privilegios buscar, modificar o eliminar a un usuario con muchos privilegios (admin). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38053.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38053.json index 87100d76d69..b42f5526b67 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38053.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38053.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38053", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:11.617", - "lastModified": "2024-07-09T11:15:11.617", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /settings/{settingName} permite a un usuario con pocos privilegios recuperar, modificar o eliminar la configuraci\u00f3n de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38054.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38054.json index 01828e7a09e..d1b0aef5465 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38054.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38054.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38054", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:11.820", - "lastModified": "2024-07-09T11:15:11.820", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /customers/{customerId} allows a low privileged user to fetch, modify or delete a low privileged user (customer). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /customers/{customerId} permite a un usuario con pocos privilegios buscar, modificar o eliminar a un usuario con pocos privilegios (cliente). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38055.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38055.json index c1bc92cb316..318947ed00b 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38055.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38055.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38055", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-09T11:15:12.013", - "lastModified": "2024-07-09T11:15:12.013", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A BOLA vulnerability in GET, PUT, DELETE /services/{serviceId} allows a low privileged user to fetch, modify or delete the services of any user (including admin). This results in unauthorized access and unauthorized data manipulation." + }, + { + "lang": "es", + "value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /services/{serviceId} permite a un usuario con pocos privilegios recuperar, modificar o eliminar los servicios de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json index 54c0d783d50..cc35c2ad869 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json @@ -2,8 +2,16 @@ "id": "CVE-2023-38817", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-11T19:15:10.180", - "lastModified": "2024-05-17T02:26:42.437", + "lastModified": "2024-07-09T18:15:08.577", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39328.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39328.json index 652de64e26f..75f644e9778 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39328.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39328.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39328", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-09T14:15:03.400", - "lastModified": "2024-07-09T14:15:03.400", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40356.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40356.json index 4d5fe563357..5277b45f30f 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40356.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40356.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40356", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-07-09T16:15:03.067", - "lastModified": "2024-07-09T16:15:03.067", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40702.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40702.json index 86e6cb2a607..694a0f3266b 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40702.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40702.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40702", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-07-09T16:15:03.220", - "lastModified": "2024-07-09T16:15:03.220", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json new file mode 100644 index 00000000000..7d78977af2a --- /dev/null +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-48194", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:08.790", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \\x0. After executing set_client_qos, control over the gp register can be obtained." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://tenda.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/zt20xx/CVE-2023-48194", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50178.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50178.json index 726399876c2..6c90c759591 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50178.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50178", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:03.390", - "lastModified": "2024-07-09T16:15:03.390", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50179.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50179.json index fc9c5bb5737..65b57e174ac 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50179.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50179.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50179", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:03.640", - "lastModified": "2024-07-09T16:15:03.640", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50181.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50181.json index d76b0dc495f..aa0ef3d8bed 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50181.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50181.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50181", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:03.853", - "lastModified": "2024-07-09T16:15:03.853", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json new file mode 100644 index 00000000000..675b1bbef09 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2023-50805", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:10.590", + "lastModified": "2024-07-09T19:15:10.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2023-50805/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json new file mode 100644 index 00000000000..f368a68f89e --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2023-50806", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:10.820", + "lastModified": "2024-07-09T19:15:10.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850 Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows out-of-bounds access to a heap buffer in the SIM Proactive Command." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2023-50806/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json new file mode 100644 index 00000000000..2bb2280399d --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2023-50807", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:11.020", + "lastModified": "2024-07-09T19:15:11.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in Samsung Wearable Processor and Modems with versions Exynos 9110, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2023-50807/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52237.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52237.json index 3f3d660464c..b356b9c0fc2 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52237.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52237.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52237", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:10.743", - "lastModified": "2024-07-09T12:15:10.743", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52238.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52238.json index 0acf4c5112b..6d395cd94b1 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52238.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52238.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52238", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:11.030", - "lastModified": "2024-07-09T12:15:11.030", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52891.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52891.json index 01fd4c2809c..788277e6576 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52891.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52891.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52891", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:11.263", - "lastModified": "2024-07-09T12:15:11.263", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1305.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1305.json index f60ed5e2a50..3036b4e2479 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1305.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1305", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T18:15:07.150", - "lastModified": "2024-07-09T16:22:15.950", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20701.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20701.json index 1a726804a04..ae3606dddbe 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20701.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20701", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:10.737", - "lastModified": "2024-07-09T17:15:10.737", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json index bad1c8a559d..8be54a9b7cd 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21303", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.117", - "lastModified": "2024-07-09T17:15:11.117", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json index c6e5c86a5d4..d0ab133bec0 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21308", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.337", - "lastModified": "2024-07-09T17:15:11.337", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json index 1e3003452c8..b1f166fd34a 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21317", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.573", - "lastModified": "2024-07-09T17:15:11.573", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json index 4ff9f1b93dd..dad4a425586 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21331", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.800", - "lastModified": "2024-07-09T17:15:11.800", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json index beec51414e4..15bb4211b67 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21332", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.033", - "lastModified": "2024-07-09T17:15:12.033", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json index b29526cce73..e70a9501fc9 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21333", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.260", - "lastModified": "2024-07-09T17:15:12.260", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json index 3fcaa1d502b..ed0eefce965 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21335", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.487", - "lastModified": "2024-07-09T17:15:12.487", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json index bbecfa12428..cad63049b5f 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21373", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.857", - "lastModified": "2024-07-09T17:15:12.857", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json index ed17b212b4c..fcb4f838b31 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21398", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.103", - "lastModified": "2024-07-09T17:15:13.103", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json index 3e3e398c639..881f9b06b3d 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21414", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.327", - "lastModified": "2024-07-09T17:15:13.327", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json index 67189a2603c..5f7ea06dde6 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21415", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.550", - "lastModified": "2024-07-09T17:15:13.550", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json index 72e71398405..8ddecc7b781 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21425", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.770", - "lastModified": "2024-07-09T17:15:13.770", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json index 6b0d1f8e745..816404d5a37 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21428", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.973", - "lastModified": "2024-07-09T17:15:13.973", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json index 499635c02a3..0a8ed034b25 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21449.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21449", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:14.177", - "lastModified": "2024-07-09T17:15:14.177", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21729.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21729.json index 04eb38e384f..d442b444cd3 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21729.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21729", "sourceIdentifier": "security@joomla.org", "published": "2024-07-09T17:15:14.463", - "lastModified": "2024-07-09T17:15:14.463", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21730.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21730.json index 32d1faca82f..c5aedf6ff7d 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21730.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21730", "sourceIdentifier": "security@joomla.org", "published": "2024-07-09T17:15:14.580", - "lastModified": "2024-07-09T17:15:14.580", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21731.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21731.json index e012933a692..068ab5dba63 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21731.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21731", "sourceIdentifier": "security@joomla.org", "published": "2024-07-09T17:15:14.660", - "lastModified": "2024-07-09T17:15:14.660", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json index 3406e792a0e..ffc689035ac 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21759", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:04.357", - "lastModified": "2024-07-09T16:15:04.357", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2177.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2177.json index 3db41240a98..e3ab64fa6bc 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2177.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2177.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2177", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-09T14:15:03.953", - "lastModified": "2024-07-09T14:15:03.953", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json index 6f9382e7d89..70cf1555b89 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22020", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-09T02:15:09.973", - "lastModified": "2024-07-09T16:22:17.840", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json index 8bf8d9bfeac..7ed6663785b 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22062", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-07-09T07:15:03.157", - "lastModified": "2024-07-09T07:15:03.157", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a permissions and access control vulnerability in ZXCLOUD IRAI.An attacker can elevate non-administrator permissions to administrator permissions by modifying the configuration." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de permisos y control de acceso en ZXCLOUD IRAI. Un atacante puede elevar los permisos que no son de administrador a permisos de administrador modificando la configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json index 3f60c9a7d78..91c85124718 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22271.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22271", "sourceIdentifier": "security@vmware.com", "published": "2024-07-09T13:15:09.887", - "lastModified": "2024-07-09T13:15:09.887", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json index c6f1b8f39fa..dc738c501e1 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23562", "sourceIdentifier": "psirt@hcl.com", "published": "2024-07-08T16:15:07.797", - "lastModified": "2024-07-09T16:22:18.987", + "lastModified": "2024-07-09T18:15:09.083", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A security vulnerability in HCL Domino could allow disclosure of sensitive configuration information. A remote unauthenticated attacker could exploit this vulnerability to obtain information to launch further attacks against the affected system." + "value": "This vulnerability is re-assessed.\u00a0 Vulnerability details will be updated." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json index 5c7dd095d03..4755679c274 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23663", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:04.593", - "lastModified": "2024-07-09T16:15:04.593", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json index 995f58c4c33..ee481b15493 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26015", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:04.810", - "lastModified": "2024-07-09T16:15:04.810", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json index a61839f012c..0426d17b9e2 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26184", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:14.773", - "lastModified": "2024-07-09T17:15:14.773", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26278.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26278.json index f472bf22fef..03ab6a95922 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26278.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26278.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26278", "sourceIdentifier": "security@joomla.org", "published": "2024-07-09T17:15:14.970", - "lastModified": "2024-07-09T17:15:14.970", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26279.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26279.json index 68b04be6b74..7fdc57a278d 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26279.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26279", "sourceIdentifier": "security@joomla.org", "published": "2024-07-09T17:15:15.047", - "lastModified": "2024-07-09T17:15:15.047", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27183.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27183.json new file mode 100644 index 00000000000..7e7ed1ae89b --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27183.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-27183", + "sourceIdentifier": "security@joomla.org", + "published": "2024-07-09T18:15:09.277", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XSS vulnerability in DJ-HelpfulArticles component for Joomla." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://extensions.joomla.org/extension/dj-helpfularticles/", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27360.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27360.json new file mode 100644 index 00000000000..5eb095c21cd --- /dev/null +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27360.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-27360", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:09.370", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, and Exynos W930 where they do not properly check length of the data, which can lead to a Denial of Service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27360/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json new file mode 100644 index 00000000000..d135974a766 --- /dev/null +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-27362", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:09.573", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27362/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27782.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27782.json index 93b421fbf41..191b99a58d0 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27782.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27782", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.017", - "lastModified": "2024-07-09T16:15:05.017", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27783.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27783.json index b031407fc54..be46350ed2c 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27783.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27783.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27783", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.240", - "lastModified": "2024-07-09T16:15:05.240", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json index f5de501fc8f..7e7a1a0ce0c 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27784", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.470", - "lastModified": "2024-07-09T16:15:05.470", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json index b862eb88503..16f96d1946e 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27785", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.687", - "lastModified": "2024-07-09T16:15:05.687", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28067.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28067.json new file mode 100644 index 00000000000..cf3e6ccd093 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28067.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-28067", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:09.790", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Samsung Exynos Modem 5300 allows a Man-in-the-Middle (MITM) attacker to downgrade the security mode of packets going to the victim, enabling the attacker to send messages to the victim in plaintext." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-28067/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28747.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28747.json index 5fc545534a8..f76164276a7 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28747.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28747.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28747", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-09T07:15:03.563", - "lastModified": "2024-07-09T07:15:03.563", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges.\n" + }, + { + "lang": "es", + "value": " Un atacante remoto no autenticado puede utilizar las credenciales codificadas para acceder a los dispositivos SmartSPS con altos privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28748.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28748.json index 731c8859565..298e084d5af 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28748.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28748.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28748", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-09T07:15:03.827", - "lastModified": "2024-07-09T07:15:03.827", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote attacker with high privileges may use a reading file function to inject OS commands.\n" + }, + { + "lang": "es", + "value": " Un atacante remoto con altos privilegios puede utilizar una funci\u00f3n de lectura de archivos para inyectar comandos del sistema operativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28749.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28749.json index d9f4b0f0423..672e8871391 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28749.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28749.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28749", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-09T07:15:04.067", - "lastModified": "2024-07-09T07:15:04.067", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote attacker with high privileges may use a writing file function to inject OS commands.\n" + }, + { + "lang": "es", + "value": "Un atacante remoto con altos privilegios puede utilizar una funci\u00f3n de escritura de archivos para inyectar comandos del sistema operativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28750.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28750.json index 72c8bc0e052..76b48139211 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28750.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28750.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28750", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-09T07:15:04.323", - "lastModified": "2024-07-09T07:15:04.323", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote attacker with high privileges may use a deleting file function to inject OS commands.\n" + }, + { + "lang": "es", + "value": " Un atacante remoto con altos privilegios puede utilizar una funci\u00f3n de eliminaci\u00f3n de archivos para inyectar comandos del sistema operativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28751.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28751.json index 2046459c4a0..693282052f1 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28751.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28751.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28751", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-09T07:15:04.587", - "lastModified": "2024-07-09T07:15:04.587", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An high privileged remote attacker can enable telnet access that accepts hardcoded credentials.\u00a0\n" + }, + { + "lang": "es", + "value": " Un atacante remoto con altos privilegios puede habilitar el acceso telnet que acepte credenciales codificadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json index 29706c5b348..9984371b4ae 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28882", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T22:15:02.410", - "lastModified": "2024-07-09T13:15:10.117", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json index 80935c645c6..60145bee37a 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28899", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:15.210", - "lastModified": "2024-07-09T17:15:15.210", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json index ebfbfdd53f5..dfb9303021e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28928", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:15.447", - "lastModified": "2024-07-09T17:15:15.447", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json index f6221b601eb..4bb1199fb50 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30013", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:15.660", - "lastModified": "2024-07-09T17:15:15.660", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30061.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30061.json index a5227e59617..829edb440ef 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30061.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30061", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:15.990", - "lastModified": "2024-07-09T17:15:15.990", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json index 0f6c0854ad3..93dabbcee01 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30071", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:16.233", - "lastModified": "2024-07-09T17:15:16.233", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json index 9b54c046896..451e26338f5 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30079", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:16.467", - "lastModified": "2024-07-09T17:15:16.467", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json index 27f805ede1e..3b80e2c6e56 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30081", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:16.717", - "lastModified": "2024-07-09T17:15:16.717", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json index 4191a7b05af..09c6d716a99 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30098", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:16.973", - "lastModified": "2024-07-09T17:15:16.973", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json index cb1b8c8afeb..2080ec41645 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30105", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:17.200", - "lastModified": "2024-07-09T17:15:17.200", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30321.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30321.json index 95746ef3134..f857b1e2695 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30321.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30321", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:11.707", - "lastModified": "2024-07-09T12:15:11.707", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31957.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31957.json new file mode 100644 index 00000000000..facb8068ea8 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31957.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-31957", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:10.013", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 2200 and Exynos 2400 where they lack a check for the validation of native handles, which can result in a DoS(Denial of Service) attack by unmapping an invalid length." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31957/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json index 2727511bf82..7288b14824d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31982", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:08.463", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-09T19:15:11.370", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -70,6 +71,10 @@ { "url": "https://jira.xwiki.org/browse/XWIKI-21472", "source": "security-advisories@github.com" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/xwiki-rce-cve-2024-31982", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32056.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32056.json index e262b10d830..6a8c008bd5c 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32056.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32056", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:12.097", - "lastModified": "2024-07-09T12:15:12.097", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32987.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32987.json index 7c7b244d6bd..375c3cc7b5a 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32987.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32987", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:17.410", - "lastModified": "2024-07-09T17:15:17.410", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3228.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3228.json index 6160ac492f7..26ba7e735f3 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3228.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3228.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3228", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:04.430", - "lastModified": "2024-07-09T09:15:04.430", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Sharing Plugin \u2013 Kiwi plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.1.7 via the 'kiwi-nw-pinterest' class. This makes it possible for unauthenticated attackers to view limited content from password protected posts." + }, + { + "lang": "es", + "value": "El complemento Social Sharing Plugin \u2013 Kiwi para WordPress es vulnerable a la exposici\u00f3n de la informaci\u00f3n en todas las versiones hasta la 2.1.7 incluida a trav\u00e9s de la clase 'kiwi-nw-pinterest'. Esto hace posible que atacantes no autenticados vean contenido limitado de publicaciones protegidas con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json index 8f85637ff2f..5d3c3c117f3 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33509", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-07-09T16:15:05.950", - "lastModified": "2024-07-09T16:15:05.950", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33653.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33653.json index 214290de9e8..46e53e317b2 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33653.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33653", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:13.553", - "lastModified": "2024-07-09T12:15:13.553", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33654.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33654.json index 075c239b35f..94b711c28fa 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33654.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33654", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:13.773", - "lastModified": "2024-07-09T12:15:13.773", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json new file mode 100644 index 00000000000..0deb0ccd7e2 --- /dev/null +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-34123", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-07-09T19:15:11.493", + "lastModified": "2024-07-09T19:15:11.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34685.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34685.json index 5ab82bf3375..1f03f40984d 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34685.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34685.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34685", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:12.090", - "lastModified": "2024-07-09T04:15:12.090", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to weak encoding of user-controlled input in\nSAP NetWeaver Knowledge Management XMLEditor which allows malicious scripts can\nbe executed in the application, potentially leading to a Cross-Site Scripting\n(XSS) vulnerability. This has no impact on the availability of the application\nbut it has a low impact on its confidentiality and integrity." + }, + { + "lang": "es", + "value": "Debido a la codificaci\u00f3n d\u00e9bil de la entrada controlada por el usuario en SAP NetWeaver Knowledge Management XMLEditor, que permite que se puedan ejecutar scripts maliciosos en la aplicaci\u00f3n, lo que podr\u00eda provocar una vulnerabilidad de Cross-Site Scripting (XSS). Esto no tiene ning\u00fan impacto en la disponibilidad de la aplicaci\u00f3n pero tiene un impacto bajo en su confidencialidad e integridad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34689.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34689.json index ce8e96ed686..3f1a356974c 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34689.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34689.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34689", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:10.873", - "lastModified": "2024-07-09T05:15:10.873", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebFlow Services of SAP Business Workflow allows\nan authenticated attacker to enumerate accessible HTTP endpoints in the\ninternal network by specially crafting HTTP requests. On successful\nexploitation this can result in information disclosure. It has no impact on\nintegrity and availability of the application." + }, + { + "lang": "es", + "value": "WebFlow Services de SAP Business Workflow permite a un atacante autenticado enumerar endpoints HTTP accesibles en la red interna mediante la elaboraci\u00f3n especial de solicitudes HTTP. Si se explota con \u00e9xito, esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n. No tiene ning\u00fan impacto en la integridad y disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34692.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34692.json index edca8806a22..a6aec9264ef 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34692.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34692.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34692", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:11.183", - "lastModified": "2024-07-09T05:15:11.183", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to missing verification of file type or\ncontent, SAP Enable Now allows an authenticated attacker to upload arbitrary\nfiles. These files include executables which might be downloaded and executed\nby the user which could host malware. On successful exploitation an attacker\ncan cause limited impact on confidentiality and Integrity of the application." + }, + { + "lang": "es", + "value": "Debido a la falta de verificaci\u00f3n del tipo o contenido del archivo, SAP Enable Now permite que un atacante autenticado cargue archivos arbitrarios. Estos archivos incluyen archivos ejecutables que el usuario puede descargar y ejecutar y que podr\u00edan alojar malware. Si un atacante la explota con \u00e9xito, puede causar un impacto limitado en la confidencialidad y la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34702.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34702.json index cb43793bce4..366f666307f 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34702.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34702.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34702", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T17:15:11.233", - "lastModified": "2024-07-08T17:15:11.233", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to 3.5.0 and 2.19.5, checking name constraints in X.509 certificates is quadratic in the number of names and name constraints. An attacker who presented a certificate chain which contained a very large number of names in the SubjectAlternativeName, signed by a CA certificate which contained a large number of name constraints, could cause a denial of service. The problem has been addressed in Botan 3.5.0 and a partial backport has also been applied and is included in Botan 2.19.5." + }, + { + "lang": "es", + "value": "Botan es una librer\u00eda de criptograf\u00eda C++. Los certificados X.509 pueden identificar curvas el\u00edpticas utilizando un identificador de objeto o una codificaci\u00f3n expl\u00edcita de los par\u00e1metros. Antes de 3.5.0 y 2.19.5, la verificaci\u00f3n de las restricciones de nombres en los certificados X.509 era cuadr\u00e1tica en el n\u00famero de nombres y restricciones de nombres. Un atacante que presentara una cadena de certificados que contuviera una gran cantidad de nombres en el SubjectAlternativeName, firmado por un certificado de CA que contuviera una gran cantidad de restricciones de nombres, podr\u00eda provocar una denegaci\u00f3n de servicio. El problema se solucion\u00f3 en Botan 3.5.0 y tambi\u00e9n se aplic\u00f3 un backport parcial que se incluye en Botan 2.19.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34786.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34786.json index bbba4f6eda4..cdc3566edc8 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34786.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34786.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34786", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-09T02:15:10.177", - "lastModified": "2024-07-09T02:15:10.177", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "UniFi iOS app 10.15.0 introduces a misconfiguration on 2nd Generation UniFi Access Points configured as standalone (not using UniFi Network Application) that could cause the SSID name to change and/or the WiFi Password to be removed on the 5GHz Radio.\n\nThis vulnerability is fixed in UniFi iOS app 10.15.2 and later." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n UniFi iOS 10.15.0 introduce una configuraci\u00f3n incorrecta en los puntos de acceso UniFi de segunda generaci\u00f3n configurados como independientes (sin usar la aplicaci\u00f3n de red UniFi) que podr\u00eda provocar que el nombre SSID cambie y/o que se elimine la contrase\u00f1a WiFi en la radio de 5 GHz. Esta vulnerabilidad se solucion\u00f3 en la aplicaci\u00f3n UniFi iOS 10.15.2 y posteriores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json index e8fc4f85360..16a8e760ffa 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3410", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-09T06:15:02.263", - "lastModified": "2024-07-09T06:15:02.263", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DN Footer Contacts WordPress plugin before 1.6.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento de WordPress DN Footer Contacts anterior a 1.6.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json index f08314a2605..54fe224feea 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35256.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35256", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:17.623", - "lastModified": "2024-07-09T17:15:17.623", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35261.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35261.json index 87d99cf2e85..a14f1b66789 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35261.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35261.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35261", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:17.857", - "lastModified": "2024-07-09T17:15:17.857", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json index 14c8a835dd1..dd6ab75f192 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35264", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:18.213", - "lastModified": "2024-07-09T17:15:18.213", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35266.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35266.json index 5d77e5a89d9..54340d238d9 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35266.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35266", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:18.413", - "lastModified": "2024-07-09T17:15:18.413", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35267.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35267.json index de8c7903c23..47fe2265eaf 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35267.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35267", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:18.630", - "lastModified": "2024-07-09T17:15:18.630", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json index 7b2903c41fe..dceee6f7501 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35270", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:18.820", - "lastModified": "2024-07-09T17:15:18.820", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json index 0cd361d5f14..68808882be3 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35271.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35271", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.023", - "lastModified": "2024-07-09T17:15:19.023", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json index f5bdc5e08ca..8e51d90be57 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35272", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.217", - "lastModified": "2024-07-09T17:15:19.217", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35777.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35777.json index de4d5de281b..b99d51ad303 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35777.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35777.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35777", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:03.223", - "lastModified": "2024-07-09T10:15:03.223", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3563.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3563.json index f8a8e7122cd..2159a88e219 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3563.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3563.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3563", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:04.670", - "lastModified": "2024-07-09T09:15:04.670", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Genesis Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Sharing block in all versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Genesis Blocks para WordPress es vulnerable a las Cross Site Scripting almacenado a trav\u00e9s del bloque Compartir del complemento en todas las versiones hasta la 3.1.3 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json index 6232bc6b445..af3bfb3a960 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3596", "sourceIdentifier": "cret@cert.org", "published": "2024-07-09T12:15:20.700", - "lastModified": "2024-07-09T15:15:11.527", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json index f462ea19ccd..5fba1445d15 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36526.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36526", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T17:15:19.430", - "lastModified": "2024-07-09T17:15:19.430", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json index 0def331e5f1..5deea0e5085 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36843", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T20:15:10.290", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-09T19:15:11.767", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://github.com/balckgu1/libmodbusPoc/blob/main/gdb.md", + "source": "cve@mitre.org" + }, { "url": "https://github.com/stephane/libmodbus/issues/748", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3603.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3603.json index a1b6e3e42bb..259c171a3d4 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3603.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3603.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3603", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:04.893", - "lastModified": "2024-07-09T09:15:04.893", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OSM \u2013 OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'osm_map' shortcode in all versions up to, and including, 6.0.2 due to insufficient input sanitization and output escaping on user supplied attributes such as 'theme'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento OSM \u2013 OpenStreetMap para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'osm_map' del complemento en todas las versiones hasta la 6.0.2 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en atributos proporcionados por el usuario como 'theme' '. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3604.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3604.json index 4900dcf33a5..9067263986b 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3604.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3604.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3604", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:05.147", - "lastModified": "2024-07-09T09:15:05.147", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OSM \u2013 OpenStreetMap plugin for WordPress is vulnerable to SQL Injection via the 'tagged_filter' attribute of the 'osm_map_v3' shortcode in all versions up to, and including, 6.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento OSM \u2013 OpenStreetMap para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo 'tagged_filter' del shortcode 'osm_map_v3' en todas las versiones hasta la 6.0.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente. en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3608.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3608.json index 829f5d1ad92..2ed29bbe199 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3608.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3608.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3608", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:05.393", - "lastModified": "2024-07-09T09:15:05.393", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Product Designer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the product_designer_ajax_delete_attach_id() function in all versions up to, and including, 1.0.33. This makes it possible for unauthenticated attackers to delete arbitrary attachments." + }, + { + "lang": "es", + "value": " El complemento Product Designer para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n product_designer_ajax_delete_attach_id() en todas las versiones hasta la 1.0.33 incluida. Esto hace posible que atacantes no autenticados eliminen archivos adjuntos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json index 15cd8bdfb9c..0a6086b332a 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3653", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-08T22:15:02.527", - "lastModified": "2024-07-09T06:15:02.393", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Undertow. Este problema requiere habilitar el controlador de aprendizaje-push en la configuraci\u00f3n del servidor, que est\u00e1 deshabilitado de forma predeterminada, dejando la configuraci\u00f3n maxAge en el controlador sin configurar. El valor predeterminado es -1, lo que hace que el controlador sea vulnerable. Si alguien sobrescribe esa configuraci\u00f3n, el servidor no est\u00e1 sujeto al ataque. El atacante debe poder llegar al servidor con una solicitud HTTP normal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37090.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37090.json index fbe78481480..a5ee3575401 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37090.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37090", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:03.487", - "lastModified": "2024-07-09T10:15:03.487", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37112.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37112.json index ff117c675fd..4ed34858325 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37112.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37112.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37112", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T09:15:02.530", - "lastModified": "2024-07-09T09:15:02.530", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7." + }, + { + "lang": "es", + "value": " Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Membership Software WishList Member X. Este problema afecta a WishList Member X: desde n/a antes de 3.26.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37171.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37171.json index 4ddc06ce0db..dd7f9583ac8 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37171.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37171.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37171", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:11.407", - "lastModified": "2024-07-09T05:15:11.407", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Transportation Management (Collaboration\nPortal) allows an attacker with non-administrative privileges to send a crafted\nrequest from a vulnerable web application. This will trigger the application\nhandler to send a request to an unintended service, which may reveal\ninformation about that service. The information obtained could be used to\ntarget internal systems behind firewalls that are normally inaccessible to an\nattacker from the external network, resulting in a Server-Side Request Forgery\nvulnerability. There is no effect on integrity or availability of the\napplication." + }, + { + "lang": "es", + "value": "SAP Transportation Management (Collaboration Portal) permite a un atacante con privilegios no administrativos enviar una solicitud manipulada desde una aplicaci\u00f3n web vulnerable. Esto har\u00e1 que el controlador de la aplicaci\u00f3n env\u00ede una solicitud a un servicio no deseado, lo que puede revelar informaci\u00f3n sobre ese servicio. La informaci\u00f3n obtenida podr\u00eda usarse para apuntar a sistemas internos detr\u00e1s de firewalls que normalmente son inaccesibles para un atacante desde la red externa, lo que resultar\u00eda en una vulnerabilidad de falsificaci\u00f3n de solicitudes del lado del servidor. No hay ning\u00fan efecto sobre la integridad o disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37172.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37172.json index 2c43487beb7..ab4f03b07e3 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37172.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37172.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37172", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:11.607", - "lastModified": "2024-07-09T05:15:11.607", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP S/4HANA Finance (Advanced Payment\nManagement) does not perform necessary authorization check for an authenticated\nuser, resulting in escalation of privileges. As a result, it has a low impact\nto confidentiality and availability but there is no impact on the integrity." + }, + { + "lang": "es", + "value": "SAP S/4HANA Finance (Advanced Payment Management) no realiza la verificaci\u00f3n de autorizaci\u00f3n necesaria para un usuario autenticado, lo que resulta en una escalada de privilegios. Como resultado, tiene un bajo impacto en la confidencialidad y la disponibilidad, pero no tiene ning\u00fan impacto en la integridad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37173.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37173.json index a8fefcbbb31..5bd66b388d7 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37173.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37173.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37173", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:12.867", - "lastModified": "2024-07-09T04:15:12.867", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to insufficient input validation, SAP\n CRM WebClient UI allows an unauthenticated attacker to craft a URL link which\n embeds a malicious script. When a victim clicks on this link, the script will\n be executed in the victim's browser giving the attacker the ability to access\n and/or modify information with no effect on availability of the application." + }, + { + "lang": "es", + "value": "Debido a una validaci\u00f3n de entrada insuficiente, la interfaz de usuario de SAP CRM WebClient permite que un atacante no autenticado cree un enlace URL que incorpore un script malicioso. Cuando una v\u00edctima hace clic en este enlace, el script se ejecutar\u00e1 en el navegador de la v\u00edctima, d\u00e1ndole al atacante la capacidad de acceder y/o modificar informaci\u00f3n sin ning\u00fan efecto sobre la disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37174.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37174.json index 86dc75aa96c..2a09d767711 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37174.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37174.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37174", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:13.127", - "lastModified": "2024-07-09T04:15:13.127", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Custom CSS support option in SAP CRM WebClient\nUI does not sufficiently encode user-controlled inputs resulting in Cross-Site\nScripting vulnerability. On successful exploitation an attacker can cause\nlimited impact on confidentiality and integrity of the application." + }, + { + "lang": "es", + "value": "La opci\u00f3n de soporte CSS personalizado en la interfaz de usuario de SAP CRM WebClient no codifica suficientemente las entradas controladas por el usuario, lo que genera una vulnerabilidad de Cross Site Scripting. Si se explota con \u00e9xito, un atacante puede causar un impacto limitado en la confidencialidad y la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37175.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37175.json index cc9339a6010..262aeab67e5 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37175.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37175.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37175", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:11.823", - "lastModified": "2024-07-09T05:15:11.823", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP CRM WebClient does not\nperform necessary authorization check for an authenticated user, resulting in\nescalation of privileges. This could allow an attacker to access some sensitive\ninformation." + }, + { + "lang": "es", + "value": "SAP CRM WebClient no realiza la verificaci\u00f3n de autorizaci\u00f3n necesaria para un usuario autenticado, lo que resulta en una escalada de privilegios. Esto podr\u00eda permitir que un atacante acceda a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37180.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37180.json index 15809dcd239..d18181627ea 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37180.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37180.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37180", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:12.033", - "lastModified": "2024-07-09T05:15:12.033", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under certain conditions SAP NetWeaver\nApplication Server for ABAP and ABAP Platform allows an attacker to access\nremote-enabled function module with no further authorization which would\notherwise be restricted, the function can be used to read non-sensitive\ninformation with low impact on confidentiality of the application." + }, + { + "lang": "es", + "value": "Bajo ciertas condiciones, SAP NetWeaver Application Server para ABAP y ABAP Platform permite a un atacante acceder al m\u00f3dulo de funci\u00f3n habilitado de forma remota sin autorizaci\u00f3n adicional que de otro modo estar\u00eda restringida; la funci\u00f3n se puede usar para leer informaci\u00f3n no confidencial con bajo impacto en la confidencialidad de la solicitud." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37224.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37224.json index 96cf3d12801..c51236ce116 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37224.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37224", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:03.717", - "lastModified": "2024-07-09T10:15:03.717", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37225.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37225.json index 93a188da2a7..36ca3f87c88 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37225.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37225.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37225", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T09:15:02.890", - "lastModified": "2024-07-09T09:15:02.890", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho Marketing Automation.This issue affects Zoho Marketing Automation: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"inyecci\u00f3n SQL\") en Zoho Marketing Automation. Este problema afecta a Zoho Marketing Automation: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json index de8bac49d08..ab24e8522c3 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37253", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:03.933", - "lastModified": "2024-07-09T10:15:03.933", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37256.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37256.json index 5b00b55a043..9f6a92d0810 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37256.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37256.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37256", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T09:15:03.157", - "lastModified": "2024-07-09T09:15:03.157", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.7.1." + }, + { + "lang": "es", + "value": " Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Themeum Tutor LMS. Este problema afecta a Tutor LMS: desde n/a hasta 2.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json index 6950b4464f6..dde5ae09fa5 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37260", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T10:15:03.190", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-09T18:56:18.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeruby:foxiz:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.6", + "matchCriteriaId": "860EDA10-4700-4E35-9942-234D38011DB5" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/foxiz/wordpress-foxiz-theme-theme-2-3-5-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37266.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37266.json index c03b8046449..4aff92ef533 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37266.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37266", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:04.147", - "lastModified": "2024-07-09T10:15:04.147", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37268.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37268.json index 08ad0c84988..aec50e2ff8f 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37268.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37268.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37268", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:04.387", - "lastModified": "2024-07-09T10:15:04.387", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json index e20148f73f5..0eeb962746d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37318", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.520", - "lastModified": "2024-07-09T17:15:19.520", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json index 1a6965694f0..91613f0a68f 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37319.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37319", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.757", - "lastModified": "2024-07-09T17:15:19.757", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json index 1152542cd87..4b5f4fc445f 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37320.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37320", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:19.973", - "lastModified": "2024-07-09T17:15:19.973", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json index 9b2573703f9..3880ae3fd68 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37321", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.180", - "lastModified": "2024-07-09T17:15:20.180", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json index c84416f57dc..edb961e9e27 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37322.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37322", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.390", - "lastModified": "2024-07-09T17:15:20.390", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json index 0829a41c1c2..3a4f827a467 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37323.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37323", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.603", - "lastModified": "2024-07-09T17:15:20.603", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json index e0f5938c7ca..718c0f5bae1 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37324.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37324", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.797", - "lastModified": "2024-07-09T17:15:20.797", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json index 8549fa7a3ba..d6c77a3d4d2 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37326.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37326", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:20.997", - "lastModified": "2024-07-09T17:15:20.997", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json index 32aa19989f6..b1ddc17f37d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37327.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37327", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.190", - "lastModified": "2024-07-09T17:15:21.190", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json index 534cdafa9ae..be4e3b540ea 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37328", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.387", - "lastModified": "2024-07-09T17:15:21.387", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json index 2ca94ff4b9f..c1d5772a547 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37329.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37329", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.660", - "lastModified": "2024-07-09T17:15:21.660", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json index 2d0f782c053..99ead2d9281 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37330.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37330", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:21.910", - "lastModified": "2024-07-09T17:15:21.910", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json index a6c1091ccc4..1ca84af4a92 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37331", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.113", - "lastModified": "2024-07-09T17:15:22.113", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json index 365f863116a..76b4939a04e 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37332", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.313", - "lastModified": "2024-07-09T17:15:22.313", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json index a84a52e8cb3..4731a1d6e3e 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37333", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.523", - "lastModified": "2024-07-09T17:15:22.523", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37334.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37334.json index 3c3679e1259..af3836660d9 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37334.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37334", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.730", - "lastModified": "2024-07-09T17:15:22.730", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json index cac9726ea92..3fd5b6ceb38 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37336", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:22.927", - "lastModified": "2024-07-09T17:15:22.927", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37410.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37410.json index 2eab0b4890d..38266f7002c 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37410.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37410.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37410", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:13.200", - "lastModified": "2024-07-09T11:15:13.200", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Beaver Addons PowerPack Lite for Beaver Builder allows Path Traversal.This issue affects PowerPack Lite for Beaver Builder: from n/a through 1.3.0.3." + }, + { + "lang": "es", + "value": "La limitaci\u00f3n inadecuada de una vulnerabilidad de nombre de ruta a un directorio restringido (\"Path Traversal\") en Beaver Addons PowerPack Lite para Beaver Builder permite Path Traversal. Este problema afecta a PowerPack Lite para Beaver Builder: desde n/a hasta 1.3.0.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37418.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37418.json index a7fd77b6c3e..06a89621ed1 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37418.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37418.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37418", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:13.423", - "lastModified": "2024-07-09T11:15:13.423", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Andy Moyle Church Admin allows Upload a Web Shell to a Web Server.This issue affects Church Admin: from n/a through 4.4.6." + }, + { + "lang": "es", + "value": " La carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en Andy Moyle Church Admin permite cargar un Web Shell a un servidor web. Este problema afecta a Church Admin: desde n/a hasta 4.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37419.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37419.json index 139e6680655..96e02775c21 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37419.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37419.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37419", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:13.640", - "lastModified": "2024-07-09T11:15:13.640", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Codeless Cowidgets \u2013 Elementor Addons allows Path Traversal.This issue affects Cowidgets \u2013 Elementor Addons: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": " La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en Codeless Cowidgets \u2013 Elementor Addons permite Path Traversal. Este problema afecta a Cowidgets: complementos de Elementor: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37420.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37420.json index 80b6fd12fe6..f094b6b539d 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37420.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37420.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37420", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:13.850", - "lastModified": "2024-07-09T11:15:13.850", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in WPZita Zita Elementor Site Library allows Upload a Web Shell to a Web Server.This issue affects Zita Elementor Site Library: from n/a through 1.6.1." + }, + { + "lang": "es", + "value": "La carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en WPZita Zita Elementor Site Library permite cargar un Web Shell a un servidor web. Este problema afecta a Zita Elementor Site Library: desde n/a hasta 1.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37424.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37424.json index e866fbab0bc..64e00eb0388 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37424.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37424.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37424", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:14.060", - "lastModified": "2024-07-09T11:15:14.060", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Automattic Newspack Blocks allows Upload a Web Shell to a Web Server.This issue affects Newspack Blocks: from n/a through 3.0.8." + }, + { + "lang": "es", + "value": "La carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en Automattic Newspack Blocks permite cargar un shell web a un servidor web. Este problema afecta a Newspack Blocks: desde n/a hasta 3.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37430.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37430.json index 7100324f093..8e54c5e63eb 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37430.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37430.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37430", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:14.263", - "lastModified": "2024-07-09T11:15:14.263", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication Bypass by Spoofing vulnerability in Patreon Patreon WordPress allows Functionality Misuse.This issue affects Patreon WordPress: from n/a through 1.9.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante suplantaci\u00f3n de identidad en Patreon Patreon WordPress permite el uso indebido de la funcionalidad. Este problema afecta a Patreon WordPress: desde n/a hasta 1.9.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37437.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37437.json index 6c5be8375ee..07eec546a33 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37437.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37437.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37437", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:14.470", - "lastModified": "2024-07-09T11:15:14.470", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Elementor Elementor Website Builder allows Cross-Site Scripting (XSS), Stored XSS.This issue affects Elementor Website Builder: from n/a through 3.22.1." + }, + { + "lang": "es", + "value": " La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en Elementor Elementor Website Builder permite Cross-Site Scripting (XSS), XSS almacenado. Este problema afecta a Elementor Website Builder: desde n/a hasta 3.22.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37442.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37442.json index edbe00c33e3..7b84d954575 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37442.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37442.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37442", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:14.697", - "lastModified": "2024-07-09T11:15:14.697", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in Photo Gallery Team Photo Gallery by Ays allows Code Injection.This issue affects Photo Gallery by Ays: from n/a before 5.7.1." + }, + { + "lang": "es", + "value": " La neutralizaci\u00f3n incorrecta de elementos especiales en la salida utilizada por una vulnerabilidad de componente posterior ('inyecci\u00f3n') en Photo Gallery Team Photo Gallery by Ays permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Photo Gallery by Ays: desde n/a antes de 5.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37454.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37454.json index 7522d802b35..c5f73a54382 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37454.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37454.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37454", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:14.923", - "lastModified": "2024-07-09T11:15:14.923", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AWSM Innovations AWSM Team allows Path Traversal.This issue affects AWSM Team: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en AWSM Innovations AWSM Team permite Path Traversal. Este problema afecta al equipo AWSM: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37455.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37455.json index f758bc686d0..146407879bb 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37455.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37455.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37455", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:15.133", - "lastModified": "2024-07-09T11:15:15.133", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Privilege Management vulnerability in Brainstorm Force Ultimate Addons for Elementor allows Privilege Escalation.This issue affects Ultimate Addons for Elementor: from n/a through 1.36.31." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en Brainstorm Force Ultimate Addons para Elementor permite la escalada de privilegios. Este problema afecta a Ultimate Addons para Elementor: desde n/a hasta 1.36.31." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json index ea84a2e48c0..ee0d9edd626 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37462", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:15.337", - "lastModified": "2024-07-09T11:15:15.337", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in G5Theme Ultimate Bootstrap Elements for Elementor allows Path Traversal.This issue affects Ultimate Bootstrap Elements for Elementor: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": " La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en G5Theme Ultimate Bootstrap Elements para Elementor permite Path Traversal. Este problema afecta a Ultimate Bootstrap Elements para Elementor: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37464.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37464.json index 7af414484b9..adc47b2c0e9 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37464.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37464", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T12:15:13.997", - "lastModified": "2024-07-09T12:15:13.997", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37484.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37484.json index f478247d7b1..16be5d47d68 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37484.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37484", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T12:15:14.213", - "lastModified": "2024-07-09T12:15:14.213", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37486.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37486.json index f8db3e29527..902065fbb4b 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37486.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37486.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37486", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T09:15:03.523", - "lastModified": "2024-07-09T09:15:03.523", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paid Memberships Pro.This issue affects Paid Memberships Pro: from n/a through 3.0.5." + }, + { + "lang": "es", + "value": " Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Paid Memberships Pro. Este problema afecta a Paid Memberships Pro: desde n/a hasta 3.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37494.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37494.json index e3cc3ee0555..c7af0b949b3 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37494.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37494.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37494", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T09:15:03.903", - "lastModified": "2024-07-09T09:15:03.903", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in KaineLabs Youzify.This issue affects Youzify: from n/a through 1.2.5." + }, + { + "lang": "es", + "value": " Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en KaineLabs Youzify. Este problema afecta a Youzify: desde n/a hasta 1.2.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37497.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37497.json index 9222aa087c6..f09ea59ffe4 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37497.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37497", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T12:15:14.437", - "lastModified": "2024-07-09T12:15:14.437", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37499.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37499.json index 4733890b3ab..dc78a254956 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37499.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37499", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T12:15:14.650", - "lastModified": "2024-07-09T12:15:14.650", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37501.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37501.json index cd3c75acd26..a0ee77f9a4b 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37501.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37501.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37501", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T12:15:14.860", - "lastModified": "2024-07-09T12:15:14.860", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37502.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37502.json index 5ec6f2eb4cd..d37a7a9e6bf 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37502.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37502.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37502", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T09:15:04.133", - "lastModified": "2024-07-09T09:15:04.133", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in wpweb WooCommerce Social Login.This issue affects WooCommerce Social Login: from n/a through 2.6.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de deserializaci\u00f3n de datos no confiables en wpweb WooCommerce Social Login. Este problema afecta a WooCommerce Social Login: desde n/a hasta 2.6.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37513.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37513.json index 413f1daf138..5a39225d633 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37513.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37513", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T13:15:10.203", - "lastModified": "2024-07-09T13:15:10.203", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37520.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37520.json index 95848b23be1..fe0aaabece9 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37520.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37520", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T13:15:10.433", - "lastModified": "2024-07-09T13:15:10.433", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37555.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37555.json index 783582e773a..d4523c4f216 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37555.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37555", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T08:15:10.270", - "lastModified": "2024-07-09T08:15:10.270", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json new file mode 100644 index 00000000000..7e84f72af4c --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37870", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:11.910", + "lastModified": "2024-07-09T19:15:11.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in processscore.php in Learning Management System Project In PHP With Source Code 1.0 allows attackers to execute arbitrary SQL commands via the id parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TThuyyy/cve1/issues/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37923.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37923.json index 790ee2ae012..d567be5f546 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37923.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37923", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T08:15:10.573", - "lastModified": "2024-07-09T08:15:10.573", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37934.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37934.json index a7203a83b50..a298ee9db04 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37934.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37934", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T13:15:10.660", - "lastModified": "2024-07-09T13:15:10.660", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37952.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37952.json index 51e4401b559..44ae7c40ea4 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37952.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37952", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T13:15:10.890", - "lastModified": "2024-07-09T13:15:10.890", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json index 04eeae1d356..712b0d67a22 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37969", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:23.137", - "lastModified": "2024-07-09T17:15:23.137", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json index be7183dadb1..0cdb427a3c9 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37970", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:23.363", - "lastModified": "2024-07-09T17:15:23.363", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json index 1d704e372fc..a48e2f69f8f 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37971", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:23.590", - "lastModified": "2024-07-09T17:15:23.590", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json index 8c7c238346c..c86d33bca62 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37972", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:23.803", - "lastModified": "2024-07-09T17:15:23.803", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json index a6d65e1663f..16917265a63 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37973", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:24.023", - "lastModified": "2024-07-09T17:15:24.023", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json index 742da4967f1..cef05fefede 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37974", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:24.250", - "lastModified": "2024-07-09T17:15:24.250", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json index 8b08c960290..132ad48e49e 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37975", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:24.470", - "lastModified": "2024-07-09T17:15:24.470", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json index 9324416eb5f..11b73e7f75a 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37977", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:24.693", - "lastModified": "2024-07-09T17:15:24.693", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json index 936d511abce..a286cd5e4cc 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37978", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:24.910", - "lastModified": "2024-07-09T17:15:24.910", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json index e3b05311edc..7f47a8f4b9d 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37981", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:25.113", - "lastModified": "2024-07-09T17:15:25.113", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json index c82bdcc3594..7d3c20df4f8 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37984", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:25.330", - "lastModified": "2024-07-09T17:15:25.330", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json index 30fb35ff70c..c1349b881ae 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37986", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:25.607", - "lastModified": "2024-07-09T17:15:25.607", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json index 024e12abf4c..dbed176907c 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37987", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:25.827", - "lastModified": "2024-07-09T17:15:25.827", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json index b44abd02c26..ecebc2de7ef 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37988", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:26.047", - "lastModified": "2024-07-09T17:15:26.047", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json index 13176747616..181c11b7e6a 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37989", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:26.270", - "lastModified": "2024-07-09T17:15:26.270", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37996.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37996.json index dfdb3794ad5..002fa1e507c 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37996.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37996", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:15.067", - "lastModified": "2024-07-09T12:15:15.067", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37997.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37997.json index 9d4deb5bab6..a900c8216c5 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37997.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37997", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:15.280", - "lastModified": "2024-07-09T12:15:15.280", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json index 1c052b74d07..67b2e3d708e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38010", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:26.497", - "lastModified": "2024-07-09T17:15:26.497", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json index fcde50f1a81..1bf5971f58d 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38011", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:26.840", - "lastModified": "2024-07-09T17:15:26.840", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json index 1afffacfbae..3761dc1733c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38013", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.060", - "lastModified": "2024-07-09T17:15:27.060", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json index fbf7f44baf9..bb111d49c37 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38015", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.290", - "lastModified": "2024-07-09T17:15:27.290", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json index ea5cb2a09d9..fe6e7bf7b5e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38017", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.533", - "lastModified": "2024-07-09T17:15:27.533", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json index f87d2177adf..a63c8265e68 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38019", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.750", - "lastModified": "2024-07-09T17:15:27.750", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json index 3b2d4a76479..9a1fee32d5f 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38020", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.110", - "lastModified": "2024-07-09T17:15:28.110", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json index e38614d634b..bf28e40b64a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38021", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.323", - "lastModified": "2024-07-09T17:15:28.323", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json index 4354488daad..ddd9ae8fa8d 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38022", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.537", - "lastModified": "2024-07-09T17:15:28.537", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json index a7a5bed77d2..ae710c9c0bd 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38023", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.760", - "lastModified": "2024-07-09T17:15:28.760", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json index a2eaeb15ccf..4bab893edfe 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38024", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.967", - "lastModified": "2024-07-09T17:15:28.967", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json index d83e509a6d4..d9b5186bbbe 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38025", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.177", - "lastModified": "2024-07-09T17:15:29.177", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json index 0c429d105a9..b8d36062717 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38027", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.400", - "lastModified": "2024-07-09T17:15:29.400", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json index d90e96cb08b..cc98d4ebe35 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38028", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.627", - "lastModified": "2024-07-09T17:15:29.627", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json index 7480a35a7fd..fb9bcb14325 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38030", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.893", - "lastModified": "2024-07-09T17:15:29.893", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json index af930d2e0a1..4038510e980 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38031", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:30.123", - "lastModified": "2024-07-09T17:15:30.123", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json index acab4ebc5bb..7269fa166b0 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38032", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:30.613", - "lastModified": "2024-07-09T17:15:30.613", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json index 8437f9728ed..0b6478598a9 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38033", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:31.093", - "lastModified": "2024-07-09T17:15:31.093", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json index 6fa99d43874..6aeb231e82b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38034", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:31.423", - "lastModified": "2024-07-09T17:15:31.423", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json index ae8225bfee7..320218ad72e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38041", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:31.807", - "lastModified": "2024-07-09T17:15:31.807", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json index edb87ac29de..fb8a8e442af 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38043", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:32.167", - "lastModified": "2024-07-09T17:15:32.167", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json index c8a2035d7c8..c09629317c7 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38044", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:32.490", - "lastModified": "2024-07-09T17:15:32.490", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json index bc5154a8dfe..ec169c64204 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38047", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:32.853", - "lastModified": "2024-07-09T17:15:32.853", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json index 14d492b5064..6c91b2470e6 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38048", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:33.210", - "lastModified": "2024-07-09T17:15:33.210", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38049.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38049.json index b34cb542f43..232e7d38356 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38049.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38049", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:33.547", - "lastModified": "2024-07-09T17:15:33.547", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json index e8f52da5356..b8c483a344e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38050", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:33.927", - "lastModified": "2024-07-09T17:15:33.927", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json index 4cb25cb185f..0c118581e7b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38051", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:34.253", - "lastModified": "2024-07-09T17:15:34.253", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json index b90a69395b4..13e201362ba 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38052", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:34.617", - "lastModified": "2024-07-09T17:15:34.617", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json index c6db42db2e7..bd0ce3a479d 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38053", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:34.963", - "lastModified": "2024-07-09T17:15:34.963", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json index 7fde293c5c1..5c2fabe1e6e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38054", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:35.320", - "lastModified": "2024-07-09T17:15:35.320", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json index 7632b237157..59b80b8e5ed 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38055", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:35.750", - "lastModified": "2024-07-09T17:15:35.750", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json index 98ecfcc6fca..a9195c8f175 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38056", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:36.130", - "lastModified": "2024-07-09T17:15:36.130", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json index 9a2a9e591a4..17442bf8f61 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38057", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:36.470", - "lastModified": "2024-07-09T17:15:36.470", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json index dee7281335e..6d332ec3784 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38058", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:36.837", - "lastModified": "2024-07-09T17:15:36.837", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json index 2dc1bbaf0e7..fb6b674d822 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38059", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:37.173", - "lastModified": "2024-07-09T17:15:37.173", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json index 4dcd76b0217..07ac66bd858 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38060", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:37.440", - "lastModified": "2024-07-09T17:15:37.440", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json index 06b2392a8dd..d4e7170978e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38061", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:37.770", - "lastModified": "2024-07-09T17:15:37.770", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json index 850e018c358..a6bdf51e3bd 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38062", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:38.087", - "lastModified": "2024-07-09T17:15:38.087", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json index e87d1e5d4be..383f8721c3c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38064", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:38.427", - "lastModified": "2024-07-09T17:15:38.427", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json index f5a118d95e8..e4f376ef9a8 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38065", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:38.757", - "lastModified": "2024-07-09T17:15:38.757", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json index acf6b058d78..8c2e2d990c9 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38066", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.067", - "lastModified": "2024-07-09T17:15:39.067", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json index 4c8fb56b7ec..477ec0f31d5 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38067", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.367", - "lastModified": "2024-07-09T17:15:39.367", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json index 2fa4bfdb5eb..ebfedb68114 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38068", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.690", - "lastModified": "2024-07-09T17:15:39.690", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json index 04a112e5937..6b667667415 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38069", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.990", - "lastModified": "2024-07-09T17:15:39.990", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json index 66863fa1edf..e2b786af61a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38070", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:40.340", - "lastModified": "2024-07-09T17:15:40.340", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json index ba782721300..1e6c7a35fce 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38071", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:40.677", - "lastModified": "2024-07-09T17:15:40.677", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json index aa7b3a2bb61..29ea6cf52fc 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38072", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:41.013", - "lastModified": "2024-07-09T17:15:41.013", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json index 520b01156d4..8275e7b151f 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38073", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:41.363", - "lastModified": "2024-07-09T17:15:41.363", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json index 57361628993..ae531e747db 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38074", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:41.733", - "lastModified": "2024-07-09T17:15:41.733", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json index ec63e786432..44912361c80 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38076", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:42.090", - "lastModified": "2024-07-09T17:15:42.090", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json index 9aa4a8b1f1d..4fbf0e191e5 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38077", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:42.430", - "lastModified": "2024-07-09T17:15:42.430", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38078.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38078.json index cb8311230c1..214f00642fb 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38078.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38078", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:42.770", - "lastModified": "2024-07-09T17:15:42.770", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json index d93720e3bad..7391a69e437 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38079", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:43.077", - "lastModified": "2024-07-09T17:15:43.077", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json index 74d4750d7ad..e945b550421 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38080", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:43.410", - "lastModified": "2024-07-09T17:15:43.410", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json index 4d32248ac7c..2b4e172425a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38081", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:43.750", - "lastModified": "2024-07-09T17:15:43.750", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json index 6bbe773f1b3..fe76965f311 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38085", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.080", - "lastModified": "2024-07-09T17:15:44.080", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38086.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38086.json index 703c953c8a4..cf262895a9f 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38086.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38086", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.373", - "lastModified": "2024-07-09T17:15:44.373", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json index d8a06ed7b81..509c2bf8cbe 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38087", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.673", - "lastModified": "2024-07-09T17:15:44.673", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json index 2a1c7c7adf8..986e6c3e8ec 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38088", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.933", - "lastModified": "2024-07-09T17:15:44.933", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38089.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38089.json index c69b8fd21df..7ed2db58aa4 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38089.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38089.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38089", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:45.170", - "lastModified": "2024-07-09T17:15:45.170", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json index e60c9c0426f..dd2e0c5ae4b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38091", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:45.380", - "lastModified": "2024-07-09T17:15:45.380", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38092.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38092.json index 85e12f59716..1ec537d9a74 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38092.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38092.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38092", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:45.633", - "lastModified": "2024-07-09T17:15:45.633", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json index 85cda0a2f23..b52e24f3509 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38094", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:46.090", - "lastModified": "2024-07-09T17:15:46.090", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38095.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38095.json index 3e5cf873757..c50370bab73 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38095.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38095", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:46.313", - "lastModified": "2024-07-09T17:15:46.313", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json index 033e56552c2..c4e312b1a88 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38099", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:46.517", - "lastModified": "2024-07-09T17:15:46.517", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json index fe9cceaf6ef..71445fa2bdd 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38100", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:46.770", - "lastModified": "2024-07-09T17:15:46.770", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json index af457334dbe..5b0208e2f30 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38101", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:46.977", - "lastModified": "2024-07-09T17:15:46.977", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json index 9b6c3a1d3d1..e5418845105 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38102", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:47.187", - "lastModified": "2024-07-09T17:15:47.187", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json index 20b8dd3c64c..a693777f24c 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38104", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:47.410", - "lastModified": "2024-07-09T17:15:47.410", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json index 42554987d2b..73d4c3cf609 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38105", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:47.640", - "lastModified": "2024-07-09T17:15:47.640", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json index 6a825ae2f44..666859bb0b7 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38112", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:47.860", - "lastModified": "2024-07-09T17:15:47.860", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38278.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38278.json index 366c322597b..ab978cad2c7 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38278.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38278.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38278", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:15.497", - "lastModified": "2024-07-09T12:15:15.497", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38363.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38363.json index 0ff76e168fa..87bd09da1fc 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38363.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38363", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T15:15:11.043", - "lastModified": "2024-07-09T15:15:11.043", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38372.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38372.json index ce49a38a2ca..043300bda9a 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38372.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38372.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38372", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T21:15:12.033", - "lastModified": "2024-07-08T21:15:12.033", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2." + }, + { + "lang": "es", + "value": "Undici es un cliente HTTP/1.1, escrito desde cero para Node.js. Dependiendo de las condiciones de la red y del proceso de una solicitud `fetch()`, `response.arrayBuffer()` podr\u00eda incluir parte de la memoria del proceso Node.js. Esto ha sido parcheado en v6.19.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json new file mode 100644 index 00000000000..19065ce8574 --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-38517", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-09T19:15:12.470", + "lastModified": "2024-07-09T19:15:12.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001", + "source": "security-advisories@github.com" + }, + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38867.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38867.json index 93f796d9dd6..98aaddf6e41 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38867.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38867", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:15.750", - "lastModified": "2024-07-09T12:15:15.750", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38970.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38970.json new file mode 100644 index 00000000000..49dac194b87 --- /dev/null +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38970.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-38970", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:10.517", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "vaeThink 1.0.2 is vulnerable to Information Disclosure via the system backend,access management administrator function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/fltys/b2c430bca85c97211010bdc602437978", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/tingyuu/vaeThink", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38971.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38971.json new file mode 100644 index 00000000000..4cff7959100 --- /dev/null +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38971.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-38971", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:10.610", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "vaeThink 1.0.2 is vulnerable to stored Cross Site Scripting (XSS) in the system backend." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/fltys/998d96272545d2cf7cd6b182adbfd672", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/tingyuu/vaeThink", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json new file mode 100644 index 00000000000..0c55dc312ab --- /dev/null +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-38972", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:10.703", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-ports/add/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39118.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39118.json index 24ecbd60c39..0c7dfef2353 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39118.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39118", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T17:15:48.153", - "lastModified": "2024-07-09T17:15:48.153", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json index 8479778997e..2c9d596de86 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39171", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T17:15:48.367", - "lastModified": "2024-07-09T17:15:48.367", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json index 6dd4d5ec896..be4e90e0416 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39312", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T17:15:11.547", - "lastModified": "2024-07-08T17:15:11.547", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. A bug in the parsing of name constraint extensions in X.509 certificates meant that if the extension included both permitted subtrees and excluded subtrees, only the permitted subtree would be checked. If a certificate included a name which was permitted by the permitted subtree but also excluded by excluded subtree, it would be accepted. Fixed in versions 3.5.0 and 2.19.5." + }, + { + "lang": "es", + "value": "Botan es una librer\u00eda de criptograf\u00eda C++. Los certificados X.509 pueden identificar curvas el\u00edpticas utilizando un identificador de objeto o una codificaci\u00f3n expl\u00edcita de los par\u00e1metros. Un error en el an\u00e1lisis de las extensiones de restricci\u00f3n de nombres en los certificados X.509 significaba que si la extensi\u00f3n inclu\u00eda tanto sub\u00e1rboles permitidos como sub\u00e1rboles excluidos, solo se verificar\u00eda el sub\u00e1rbol permitido. Si un certificado incluyera un nombre permitido por el sub\u00e1rbol permitido pero tambi\u00e9n excluido por el sub\u00e1rbol excluido, se aceptar\u00eda. Corregido en las versiones 3.5.0 y 2.19.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39487.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39487.json index 1fbabf920e0..599d374feeb 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39487.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39487", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-09T10:15:04.597", - "lastModified": "2024-07-09T10:15:04.597", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39567.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39567.json index 44c3361f36d..0ce07ed5ec2 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39567.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39567", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:16.053", - "lastModified": "2024-07-09T12:15:16.053", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39568.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39568.json index 1a0908a40b9..0d01486ff25 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39568.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39568", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:16.263", - "lastModified": "2024-07-09T12:15:16.263", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39569.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39569.json index 55cd2e5b54f..27963f089a6 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39569.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39569", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:16.490", - "lastModified": "2024-07-09T12:15:16.490", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39570.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39570.json index 44bc27bb1ed..5fb505bcff0 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39570.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39570", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:16.723", - "lastModified": "2024-07-09T12:15:16.723", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39571.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39571.json index b5b8135758d..12aefdcccbb 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39571.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39571", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:16.953", - "lastModified": "2024-07-09T12:15:16.953", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39592.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39592.json index 78a85a52611..cb95f5c91db 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39592.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39592.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39592", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:13.420", - "lastModified": "2024-07-09T04:15:13.420", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Elements of PDCE does not perform necessary\nauthorization checks for an authenticated user, resulting in escalation of\nprivileges.\n\n\n\nThis\nallows an attacker to read sensitive information causing high impact on the\nconfidentiality of the application." + }, + { + "lang": "es", + "value": "Elements of PDCE no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Esto permite a un atacante leer informaci\u00f3n confidencial causando un alto impacto en la confidencialidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39593.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39593.json index 3869dcdca3e..86b68d43d40 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39593.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39593.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39593", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:13.663", - "lastModified": "2024-07-09T04:15:13.663", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Landscape Management allows an authenticated\nuser to read confidential data disclosed by the REST Provider Definition\nresponse. Successful exploitation can cause high impact on confidentiality of\nthe managed entities." + }, + { + "lang": "es", + "value": "SAP Landscape Management permite a un usuario autenticado leer datos confidenciales revelados por la respuesta de Provider Definition REST. La explotaci\u00f3n exitosa puede causar un gran impacto en la confidencialidad de las entidades gestionadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39594.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39594.json index d46aea119e6..6ef7c1f045d 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39594.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39594.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39594", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:12.300", - "lastModified": "2024-07-09T05:15:12.300", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Business Warehouse - Business Planning and\nSimulation application does not sufficiently encode user controlled inputs,\nresulting in Reflected Cross-Site Scripting (XSS) vulnerability. After\nsuccessful exploitation, an attacker can cause low impact on the confidentiality\nand integrity of the application." + }, + { + "lang": "es", + "value": "SAP Business Warehouse: la aplicaci\u00f3n de simulaci\u00f3n y planificaci\u00f3n empresarial no codifica suficientemente las entradas controladas por el usuario, lo que genera una vulnerabilidad de Cross Site Scripting reflejado (XSS). Despu\u00e9s de una explotaci\u00f3n exitosa, un atacante puede causar un impacto reducido en la confidencialidad y la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39595.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39595.json index 0f13e920783..cc884af4294 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39595.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39595.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39595", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:12.507", - "lastModified": "2024-07-09T05:15:12.507", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Business Warehouse - Business Planning and\nSimulation application does not sufficiently encode user-controlled inputs,\nresulting in Stored Cross-Site Scripting (XSS) vulnerability. This\nvulnerability allows users to modify website content and on successful\nexploitation, an attacker can cause low impact to the confidentiality and\nintegrity of the application." + }, + { + "lang": "es", + "value": "SAP Business Warehouse: la aplicaci\u00f3n de simulaci\u00f3n y planificaci\u00f3n empresarial no codifica suficientemente las entradas controladas por el usuario, lo que genera una vulnerabilidad de Cross Site Scripting almacenado (XSS). Esta vulnerabilidad permite a los usuarios modificar el contenido del sitio web y, si se explota con \u00e9xito, un atacante puede causar poco impacto en la confidencialidad y la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39596.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39596.json index 8273c006277..05898ca6135 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39596.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39596.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39596", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:12.710", - "lastModified": "2024-07-09T05:15:12.710", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to missing authorization checks, SAP Enable\nNow allows an author to escalate privileges to access information which should\notherwise be restricted. On successful exploitation, the attacker can cause\nlimited impact on confidentiality of the application." + }, + { + "lang": "es", + "value": "Debido a la falta de comprobaciones de autorizaci\u00f3n, SAP Enable Now permite a un autor escalar privilegios para acceder a informaci\u00f3n que de otro modo deber\u00eda estar restringida. Si la explotaci\u00f3n tiene \u00e9xito, el atacante puede causar un impacto limitado en la confidencialidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39597.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39597.json index 77e2cca2c7b..d7bdee2d45b 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39597.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39597.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39597", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:13.963", - "lastModified": "2024-07-09T04:15:13.963", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SAP Commerce, a user can misuse the forgotten\npassword functionality to gain access to a Composable Storefront B2B site for\nwhich early login and registration is activated, without requiring the merchant\nto approve the account beforehand. If the site is not configured as isolated\nsite, this can also grant access to other non-isolated early login sites, even\nif registration is not enabled for those other sites." + }, + { + "lang": "es", + "value": "En SAP Commerce, un usuario puede hacer un mal uso de la funcionalidad de contrase\u00f1a olvidada para obtener acceso a un sitio B2B de Composable Storefront para el cual se activa el inicio de sesi\u00f3n y el registro temprano, sin requerir que el comerciante apruebe la cuenta de antemano. Si el sitio no est\u00e1 configurado como sitio aislado, esto tambi\u00e9n puede otorgar acceso a otros sitios de inicio de sesi\u00f3n temprano no aislados, incluso si el registro no est\u00e1 habilitado para esos otros sitios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39598.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39598.json index 86b16487001..ea3fa5735ba 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39598.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39598.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39598", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T04:15:14.860", - "lastModified": "2024-07-09T04:15:14.860", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP CRM (WebClient UI Framework) allows an\nauthenticated attacker to enumerate accessible HTTP endpoints in the internal\nnetwork by specially crafting HTTP requests. On successful exploitation this\ncan result in information disclosure. It has no impact on integrity and\navailability of the application." + }, + { + "lang": "es", + "value": "SAP CRM (WebClient UI Framework) permite a un atacante autenticado enumerar endpoints HTTP accesibles en la red interna mediante la elaboraci\u00f3n especial de solicitudes HTTP. Si se explota con \u00e9xito, esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n. No tiene ning\u00fan impacto en la integridad y disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39599.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39599.json index 915ef094cb8..2af96f094b6 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39599.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39599.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39599", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:12.933", - "lastModified": "2024-07-09T05:15:12.933", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to a Protection Mechanism Failure in SAP\nNetWeaver Application Server for ABAP and ABAP Platform, a developer can bypass\nthe configured malware scanner API because of a programming error. This leads\nto a low impact on the application's confidentiality, integrity, and\navailability." + }, + { + "lang": "es", + "value": "Debido a un fallo en el mecanismo de protecci\u00f3n en SAP NetWeaver Application Server para ABAP y la plataforma ABAP, un desarrollador puede omitir la API del esc\u00e1ner de malware configurada debido a un error de programaci\u00f3n. Esto conduce a un bajo impacto en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json index 2a2963f7688..b39e9a63df1 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39600", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:13.147", - "lastModified": "2024-07-09T05:15:13.147", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under certain conditions, the memory of SAP GUI\nfor Windows contains the password used to log on to an SAP system, which might\nallow an attacker to get hold of the password and impersonate the affected\nuser. As a result, it has a high impact on the confidentiality but there is no\nimpact on the integrity and availability." + }, + { + "lang": "es", + "value": "Bajo ciertas condiciones, la memoria de SAP GUI para Windows contiene la contrase\u00f1a utilizada para iniciar sesi\u00f3n en un sistema SAP, lo que podr\u00eda permitir a un atacante obtener la contrase\u00f1a y hacerse pasar por el usuario afectado. Como resultado, tiene un alto impacto en la confidencialidad pero no hay impacto en la integridad y disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39675.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39675.json index e2176bf2e17..e3c0bb581c5 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39675.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39675", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:17.180", - "lastModified": "2024-07-09T12:15:17.180", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json new file mode 100644 index 00000000000..9b312cf290f --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39684", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-09T19:15:12.700", + "lastModified": "2024-07-09T19:15:12.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39697.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39697.json index e65633841df..6fef86271bd 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39697.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39697", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T15:15:11.290", - "lastModified": "2024-07-09T15:15:11.290", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39698.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39698.json new file mode 100644 index 00000000000..847a25ee50b --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39698.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-39698", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-09T18:15:10.863", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "electron-updater allows for automatic updates for Electron apps. The file `packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts` implements the signature validation routine for Electron applications on Windows. Because of the surrounding shell, a first pass by `cmd.exe` expands any environment variable found in command-line above. This creates a situation where `verifySignature()` can be tricked into validating the certificate of a different file than the one that was just downloaded. If the step is successful, the malicious update will be executed even if its signature is invalid. This attack assumes a compromised update manifest (server compromise, Man-in-the-Middle attack if fetched over HTTP, Cross-Site Scripting to point the application to a malicious updater server, etc.). The patch is available starting from 6.3.0-alpha.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-154" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/electron-userland/electron-builder/blob/140e2f0eb0df79c2a46e35024e96d0563355fc89/packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts#L35-L41", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/electron-userland/electron-builder/commit/ac2e6a25aa491c1ef5167a552c19fc2085cd427f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/electron-userland/electron-builder/pull/8295", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/electron-userland/electron-builder/security/advisories/GHSA-9jxc-qjr9-vjxq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39701.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39701.json index 42d9c78c364..eaddbd0ac95 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39701.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39701.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39701", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T17:15:11.773", - "lastModified": "2024-07-08T17:15:11.773", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. Directus >=9.23.0, <=v10.5.3 improperly handles _in, _nin operators. It evaluates empty arrays as valid so expressions like {\"role\": {\"_in\": $CURRENT_USER.some_field}} would evaluate to true allowing the request to pass. This results in Broken Access Control because the rule fails to do what it was intended to do: Pass rule if **field** matches any of the **values**. This vulnerability is fixed in 10.6.0." + }, + { + "lang": "es", + "value": "Directus es una API y un panel de aplicaciones en tiempo real para administrar el contenido de la base de datos SQL. Directus >=9.23.0, <=v10.5.3 maneja incorrectamente los operadores _in, _nin. Eval\u00faa matrices vac\u00edas como v\u00e1lidas, por lo que expresiones como {\"role\": {\"_in\": $CURRENT_USER.some_field}} se evaluar\u00edan como verdaderas, lo que permitir\u00eda que se aprobara la solicitud. Esto da como resultado un control de acceso roto porque la regla no logra hacer lo que estaba previsto: aprobar la regla si el **field** coincide con alguno de los **values**. Esta vulnerabilidad se solucion\u00f3 en 10.6.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39865.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39865.json index d990283b5a7..ab8f2eb0353 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39865.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39865", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:17.443", - "lastModified": "2024-07-09T12:15:17.443", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39866.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39866.json index 5d86ba57a4f..c17a6b6c1e8 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39866.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39866", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:17.683", - "lastModified": "2024-07-09T12:15:17.683", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39867.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39867.json index 8478d8280f5..274990eb135 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39867.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39867", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:17.917", - "lastModified": "2024-07-09T12:15:17.917", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39868.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39868.json index 45c7082f0a8..b8012b43f40 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39868.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39868", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:18.157", - "lastModified": "2024-07-09T12:15:18.157", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39869.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39869.json index 7562d5d3fa1..0c2550be2d0 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39869.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39869.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39869", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:18.377", - "lastModified": "2024-07-09T12:15:18.377", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39870.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39870.json index 9fa89979c0d..f6745d48d1f 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39870.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39870", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:18.603", - "lastModified": "2024-07-09T12:15:18.603", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39871.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39871.json index afd57145558..db7eb1f6158 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39871.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39871", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:18.833", - "lastModified": "2024-07-09T12:15:18.833", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39872.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39872.json index 7a4b26d772f..88e08e30334 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39872.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39872", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:19.070", - "lastModified": "2024-07-09T12:15:19.070", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39873.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39873.json index c7ecc2f4408..940010a7ac6 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39873.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39873", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:19.317", - "lastModified": "2024-07-09T12:15:19.317", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39874.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39874.json index 6ec24e3db0f..f0e6bb16628 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39874.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39874", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:19.560", - "lastModified": "2024-07-09T12:15:19.560", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json index 13058cbff57..fb5b7840eae 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39875", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:19.803", - "lastModified": "2024-07-09T12:15:19.803", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json index 735fa6a0630..edae44fc4ce 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39876", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:20.047", - "lastModified": "2024-07-09T12:15:20.047", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39888.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39888.json index d3b95dafb13..66fa11f584f 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39888.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39888.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39888", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:20.283", - "lastModified": "2024-07-09T12:15:20.283", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json index 79ff94625a3..1d60e32a237 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39895", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T17:15:11.980", - "lastModified": "2024-07-08T17:15:11.980", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. A denial of service (DoS) attack by field duplication in GraphQL is a type of attack where an attacker exploits the flexibility of GraphQL to overwhelm a server by requesting the same field multiple times in a single query. This can cause the server to perform redundant computations and consume excessive resources, leading to a denial of service for legitimate users. Request to the endpoint /graphql are sent when visualizing graphs generated at a dashboard. By modifying the data sent and duplicating many times the fields a DoS attack is possible. This vulnerability is fixed in 10.12.0." + }, + { + "lang": "es", + "value": "Directus es una API y un panel de aplicaciones en tiempo real para administrar el contenido de la base de datos SQL. Un ataque de denegaci\u00f3n de servicio (DoS) por duplicaci\u00f3n de campos en GraphQL es un tipo de ataque en el que un atacante aprovecha la flexibilidad de GraphQL para abrumar a un servidor solicitando el mismo campo varias veces en una sola consulta. Esto puede hacer que el servidor realice c\u00e1lculos redundantes y consuma recursos excesivos, lo que lleva a una denegaci\u00f3n de servicio para usuarios leg\u00edtimos. La solicitud al endpoint /graphql se env\u00eda al visualizar gr\u00e1ficos generados en un panel. Modificando los datos enviados y duplicando muchas veces los campos es posible un ataque DoS. Esta vulnerabilidad se solucion\u00f3 en 10.12.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json index 68ee404f222..fea1d562287 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39896", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T18:15:08.383", - "lastModified": "2024-07-08T18:15:08.383", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. When relying on SSO providers in combination with local authentication it can be possible to enumerate existing SSO users in the instance. This is possible because if an email address exists in Directus and belongs to a known SSO provider then it will throw a \"helpful\" error that the user belongs to another provider. This vulnerability is fixed in 10.13.0." + }, + { + "lang": "es", + "value": "Directus es una API y un panel de aplicaciones en tiempo real para administrar el contenido de la base de datos SQL. Cuando se depende de proveedores de SSO en combinaci\u00f3n con la autenticaci\u00f3n local, es posible enumerar los usuarios de SSO existentes en la instancia. Esto es posible porque si existe una direcci\u00f3n de correo electr\u00f3nico en Directus y pertenece a un proveedor de SSO conocido, se generar\u00e1 un error \"helpful\" de que el usuario pertenece a otro proveedor. Esta vulnerabilidad se solucion\u00f3 en 10.13.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json new file mode 100644 index 00000000000..e8d7cd14201 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39897", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-09T19:15:12.953", + "lastModified": "2024-07-09T19:15:12.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "zot is an OCI image registry. Prior to 2.1.0, the cache driver `GetBlob()` allows read access to any blob without access control check. If a Zot `accessControl` policy allows users read access to some repositories but restricts read access to other repositories and `dedupe` is enabled (it is enabled by default), then an attacker who knows the name of an image and the digest of a blob (that they do not have read access to), they may maliciously read it via a second repository they do have read access to. \n This attack is possible because [`ImageStore.CheckBlob()` calls `checkCacheBlob()`](https://github.com/project-zot/zot/blob/v2.1.0-rc2/pkg/storage/imagestore/imagestore.go#L1158-L1159) to find the blob a global cache by searching for the digest. If it is found, it is copied to the user requested repository with `copyBlob()`. The attack may be mitigated by configuring \"dedupe\": false in the \"storage\" settings. The vulnerability is fixed in 2.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json new file mode 100644 index 00000000000..b6be07688db --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-39899", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-09T19:15:13.160", + "lastModified": "2024-07-09T19:15:13.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PrivateBin is an online pastebin where the server has zero knowledge of pasted data. In v1.5, PrivateBin introduced the YOURLS server-side proxy. The idea was to allow using the YOURLs URL shortener without running the YOURLs instance without authentication and/or exposing the authentication token to the public, allowing anyone to shorten any URL. With the proxy mechanism, anyone can shorten any URL pointing to the configured PrivateBin instance. The vulnerability allowed other URLs to be shortened, as long as they contain the PrivateBin instance, defeating the limit imposed by the proxy. This vulnerability is fixed in 1.7.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + }, + { + "lang": "en", + "value": "CWE-791" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PrivateBin/PrivateBin/commit/0c4e810e6728f67d678458838d8430dfba4fcca4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PrivateBin/PrivateBin/pull/1370", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-mqqj-fx8h-437j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json new file mode 100644 index 00000000000..2efb34731f1 --- /dev/null +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40034", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:13.373", + "lastModified": "2024-07-09T19:15:13.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userLevel_deal.php?mudi=del" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pangchunyuhack/cms/blob/main/59/csrf.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json new file mode 100644 index 00000000000..4bb884e1a0c --- /dev/null +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40035", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:13.450", + "lastModified": "2024-07-09T19:15:13.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userLevel_deal.php?mudi=add." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pangchunyuhack/cms/blob/main/60/csrf.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json new file mode 100644 index 00000000000..b5d1648c76a --- /dev/null +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40036", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:13.527", + "lastModified": "2024-07-09T19:15:13.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userGroup_deal.php?mudi=add&nohrefStr=close" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pangchunyuhack/cms/blob/main/61/csrf.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json new file mode 100644 index 00000000000..098806cf73f --- /dev/null +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40037", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:13.600", + "lastModified": "2024-07-09T19:15:13.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userScore_deal.php?mudi=del" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pangchunyuhack/cms/blob/main/64/csrf.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json new file mode 100644 index 00000000000..3ae62a60168 --- /dev/null +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40038", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:13.677", + "lastModified": "2024-07-09T19:15:13.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userScore_deal.php?mudi=rev" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pangchunyuhack/cms/blob/main/63/csrf.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json new file mode 100644 index 00000000000..ce2b1c589c2 --- /dev/null +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40039", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T19:15:13.750", + "lastModified": "2024-07-09T19:15:13.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userGroup_deal.php?mudi=del" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pangchunyuhack/cms/blob/main/62/csrf.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json index 0db27006c67..1edcb8a7eb2 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40601", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.470", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-09T18:21:16.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": " Se descubri\u00f3 un problema en la extensi\u00f3n MediaWikiChat para MediaWiki hasta 1.42.1. Puede ocurrir CSRF en m\u00f3dulos API." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.42.1", + "matchCriteriaId": "ED70437F-2E16-47AE-AA89-A497DCC3C8EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://phabricator.wikimedia.org/T362588", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json new file mode 100644 index 00000000000..b4431c86ddf --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40726", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.110", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-ports/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json new file mode 100644 index 00000000000..88bfd10b74d --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40727", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.187", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/console-server-ports/add/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json new file mode 100644 index 00000000000..fe324e45379 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40728.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40728", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.270", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/console-server-ports/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json new file mode 100644 index 00000000000..4d8376560f1 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40729.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40729", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.353", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/interfaces/add/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json new file mode 100644 index 00000000000..75f462c2209 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40730", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.440", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/interfaces/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json new file mode 100644 index 00000000000..e20a3b03d30 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40731", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.520", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/rear-ports/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json new file mode 100644 index 00000000000..8571c217cc7 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40732.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40732", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.610", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/rear-ports/add/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40733.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40733.json new file mode 100644 index 00000000000..90b56be2fd9 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40733.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40733", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.700", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/front-ports/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json new file mode 100644 index 00000000000..26620b9396d --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40734", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.787", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/front-ports/add/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json new file mode 100644 index 00000000000..5eed05c5e80 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40735", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.867", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-outlets/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json new file mode 100644 index 00000000000..67a2fd16d35 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40736", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:11.947", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-outlets/add." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40737.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40737.json new file mode 100644 index 00000000000..0e65f146423 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40737.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40737", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:12.030", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/console-ports/add." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json new file mode 100644 index 00000000000..c94c1df8fe3 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40738.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40738", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:12.107", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/console-ports/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json new file mode 100644 index 00000000000..6a89c992511 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40739", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:12.187", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-feeds/add." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40740.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40740.json new file mode 100644 index 00000000000..82b8f772c8f --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40740.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40740", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:12.267", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-feeds/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json new file mode 100644 index 00000000000..d6d940ba246 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40741.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40741", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:12.350", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the circuit ID parameter at /circuits/circuits/{id}/edit/." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json new file mode 100644 index 00000000000..1d2edc3a479 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40742", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-09T18:15:12.430", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the circuit ID parameter at /circuits/circuits/add." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/minhquan202/Vuln-Netbox", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4100.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4100.json index 6202de02485..2ca484fdf73 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4100.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4100.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4100", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:05.610", - "lastModified": "2024-07-09T09:15:05.610", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Pricing Table plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.1. This is due to missing or incorrect nonce validation on the ajax() function. This makes it possible for unauthenticated attackers to perform a variety of actions related to managing pricing tables via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Pricing Table para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.0.1 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n ajax(). Esto hace posible que atacantes no autenticados realicen una variedad de acciones relacionadas con la gesti\u00f3n de tablas de precios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4102.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4102.json index 49e89fd9840..8de0845d2d0 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4102.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4102.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4102", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:05.820", - "lastModified": "2024-07-09T09:15:05.820", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Pricing Table plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 2.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform unauthorized actions like editing pricing tables." + }, + { + "lang": "es", + "value": " El complemento Pricing Table para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ajax() en todas las versiones hasta la 2.0.1 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, realicen acciones no autorizadas como editar tablas de precios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4667.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4667.json index 04e9635246b..d60e8232502 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4667.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4667.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4667", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T05:15:13.353", - "lastModified": "2024-07-09T05:15:13.353", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Blog, Posts and Category Filter for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post and Category Filter widget in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied 'post_types' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Blog, Posts and Category Filter for Elementor para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del widget de filtro de publicaciones y categor\u00edas en todas las versiones hasta la 1.0.3 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en el atributo 'post_types' proporcionado por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json index f1a820b6390..40c3b05731a 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4862", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T11:15:15.537", - "lastModified": "2024-07-09T11:15:15.537", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPBITS Addons For Elementor Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WPBITS Addons For Elementor Page Builder para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de varios widgets en todas las versiones hasta la 1.5 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4868.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4868.json index 42c3e3cb6aa..dc08655fefc 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4868.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4868.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4868", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:06.083", - "lastModified": "2024-07-09T09:15:06.083", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Extensions for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's EE Events and EE Flipbox widgets in all versions up to, and including, 2.0.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Extensions for Elementor para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de los widgets EE Events y EE Flipbox del complemento en todas las versiones hasta la 2.0.31 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4882.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4882.json index db64d99c242..d5395d1a019 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4882.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4882.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4882", "sourceIdentifier": "security@progress.com", "published": "2024-07-08T18:15:08.960", - "lastModified": "2024-07-08T18:15:08.960", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The user may be redirected to an arbitrary site in Sitefinity 15.1.8321.0 and previous versions." + }, + { + "lang": "es", + "value": "El usuario puede ser redirigido a un sitio arbitrario en Sitefinity 15.1.8321.0 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json index 820f8f9b39f..b7815db67c7 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4944", "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-07-09T03:15:02.270", - "lastModified": "2024-07-09T03:15:02.270", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation vlnerability in the WatchGuard Mobile VPN with SSL client on Windows enables a local user to execute arbitrary commands with elevated privileged.\n" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de escalada de privilegios local en el cliente WatchGuard Mobile VPN con SSL en Windows permite a un usuario local ejecutar comandos arbitrarios con privilegios elevados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5389.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5389.json index e465a6f1efc..c3b417e4791 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5389.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5389.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5389", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-09T23:15:50.490", - "lastModified": "2024-06-12T16:31:30.577", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-09T19:15:13.853", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -43,20 +44,20 @@ "type": "Secondary", "cvssData": { "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 9.3, - "baseSeverity": "CRITICAL" + "baseScore": 5.7, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, - "impactScore": 5.8 + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json index 76108c91bef..98c23023e49 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5441", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T06:15:02.710", - "lastModified": "2024-07-09T06:15:02.710", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Modern Events Calendar plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_featured_image function in all versions up to, and including, 7.11.0. This makes it possible for authenticated attackers, with subscriber access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The plugin allows administrators (via its settings) to extend the ability to submit events to unauthenticated users, which would allow unauthenticated attackers to exploit this vulnerability." + }, + { + "lang": "es", + "value": "El complemento Modern Events Calendar para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n set_featured_image en todas las versiones hasta la 7.11.0 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. El complemento permite a los administradores (a trav\u00e9s de su configuraci\u00f3n) ampliar la capacidad de enviar eventos a usuarios no autenticados, lo que permitir\u00eda a atacantes no autenticados explotar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5456.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5456.json index e7802884223..989ac3c2b08 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5456.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5456.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5456", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:06.310", - "lastModified": "2024-07-09T09:15:06.310", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Panda Video plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.0 via the 'selected_button' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Panda Video para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 1.4.0 incluida a trav\u00e9s del par\u00e1metro 'selected_button'. Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador y superior, incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5457.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5457.json index 39708b377b7..884345484bf 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5457.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5457.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5457", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:06.537", - "lastModified": "2024-07-09T09:15:06.537", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Panda Video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Panda Video para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.4.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5479.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5479.json index 7e3fa602fce..731b26f0f5a 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5479.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5479.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5479", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:06.743", - "lastModified": "2024-07-09T09:15:06.743", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Pixels plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 2.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Easy Pixels para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la configuraci\u00f3n del complemento en todas las versiones hasta la 2.13 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json index ebf31fcd197..4603267734e 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5488", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-09T06:15:03.030", - "lastModified": "2024-07-09T06:15:03.030", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present." + }, + { + "lang": "es", + "value": "El complemento SEOPress WordPress anterior a 7.9 no protege adecuadamente algunas de sus rutas API REST, lo que combinado con otra vulnerabilidad de inyecci\u00f3n de objetos puede permitir a atacantes no autenticados deserializar cadenas de dispositivos maliciosos, comprometiendo el sitio si hay una cadena adecuada presente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json index 0a015c32469..96da5b6d5c4 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5549", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-09T00:15:02.050", - "lastModified": "2024-07-09T00:15:02.050", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Origin Validation Error in GitHub repository stitionai/devika prior to -." + }, + { + "lang": "es", + "value": "Error de validaci\u00f3n de origen en el repositorio de GitHub stitionai/devika antes de -." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5569.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5569.json index 36503ac7d4b..d3a7cdafd71 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5569.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5569.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5569", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-09T00:15:02.320", - "lastModified": "2024-07-09T00:15:02.320", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the `Path` module in both zipp and zipfile, such as `joinpath`, the overloaded division operator, and `iterdir`. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la librer\u00eda jaraco/zipp que afecta a todas las versiones anteriores a la 3.19.1. La vulnerabilidad se activa al procesar un archivo zip especialmente manipulado que genera un bucle infinito. Este problema tambi\u00e9n afecta al m\u00f3dulo zipfile de CPython, ya que las funciones de la librer\u00eda zipp de terceros se fusionan posteriormente en CPython y el c\u00f3digo afectado es id\u00e9ntico en ambos proyectos. El bucle infinito se puede iniciar mediante el uso de funciones que afectan al m\u00f3dulo `Path` tanto en zipp como en zipfile, como `joinpath`, el operador de divisi\u00f3n sobrecargado e `iterdir`. Aunque el bucle infinito no agota los recursos, impide que la aplicaci\u00f3n responda. La vulnerabilidad se solucion\u00f3 en la versi\u00f3n 3.19.1 de jaraco/zipp." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5600.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5600.json index 79ae59a7a35..710b1376321 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5600.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5600.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5600", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:06.960", - "lastModified": "2024-07-09T09:15:06.960", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SCSS Happy Compiler \u2013 Compile SCSS to CSS & Automatic Enqueue plugin for WordPress is vulnerable to Stored Cross-Site Scripting due to a missing capability check and insufficient sanitization on the import_settings() function in all versions up to, and including, 1.3.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject malicious web scripts." + }, + { + "lang": "es", + "value": " El complemento SCSS Happy Compiler \u2013 Compile SCSS to CSS & Automatic Enqueue para WordPress es vulnerable a Cross Site Scripting almacenado debido a una falta de verificaci\u00f3n de capacidad y una sanitizaci\u00f3n insuficiente en la funci\u00f3n import_settings() en todas las versiones hasta la 1.3.10 incluida. . Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten scripts web maliciosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5631.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5631.json index eafda125d1c..a15fd3523da 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5631.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5631.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5631", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-09T11:15:15.740", - "lastModified": "2024-07-09T11:15:15.740", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cvd@cert.pl", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Longse NVR (Network Video Recorder) model\u00a0NVR3608PGE2W, as well as products based on this device, are transmitting user's login and password to a remote control service without using any encryption. This enables an on-path attacker to eavesdrop the credentials and subsequently obtain access to the video stream.\u00a0\nThe credentials are being sent when a user decides to change his password in router's portal." + }, + { + "lang": "es", + "value": " Longse NVR (Network Video Recorder) modelo NVR3608PGE2W, as\u00ed como los productos basados en este dispositivo, transmiten el nombre de usuario y la contrase\u00f1a a un servicio de control remoto sin utilizar ning\u00fan cifrado. Esto permite a un atacante en ruta espiar las credenciales y posteriormente obtener acceso a la transmisi\u00f3n de video. Las credenciales se env\u00edan cuando un usuario decide cambiar su contrase\u00f1a en el portal del enrutador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5632.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5632.json index 0c39aaabec1..cbf7383e5d7 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5632.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5632.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5632", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-09T11:15:16.033", - "lastModified": "2024-07-09T11:15:16.033", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cvd@cert.pl", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Longse NVR (Network Video Recorder) model\u00a0NVR3608PGE2W, as well as products based on this device, create a WiFi network with a default password.\nA user is neither advised to change it during the installation process, nor such a need is described in the manual. As the cameras from the same kit connect automatically, it is very probable for the default password to be left unchanged." + }, + { + "lang": "es", + "value": "Longse NVR (Network Video Recorder) modelo NVR3608PGE2W, as\u00ed como los productos basados en este dispositivo, crean una red WiFi con una contrase\u00f1a predeterminada. No se recomienda al usuario cambiarlo durante el proceso de instalaci\u00f3n, ni tal necesidad se describe en el manual. Como las c\u00e1maras del mismo kit se conectan autom\u00e1ticamente, es muy probable que la contrase\u00f1a predeterminada no se modifique." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5633.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5633.json index cf3a400d762..de515bef19e 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5633.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5633.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5633", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-09T11:15:16.157", - "lastModified": "2024-07-09T15:15:11.933", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cvd@cert.pl", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5634.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5634.json index 986e61c320b..249fc3b7b64 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5634.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5634.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5634", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-09T11:15:16.283", - "lastModified": "2024-07-09T11:15:16.283", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cvd@cert.pl", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Longse model\u00a0LBH30FE200W cameras, as well as products based on this device, make use of telnet passwords which follow a specific pattern. Once the pattern is known, brute-forcing the password becomes relatively easy.\u00a0\nAdditionally, every camera with the same firmware version shares the same password." + }, + { + "lang": "es", + "value": "Las c\u00e1maras Longse modelo LBH30FE200W, as\u00ed como los productos basados en este dispositivo, utilizan contrase\u00f1as telnet que siguen un patr\u00f3n espec\u00edfico. Una vez que se conoce el patr\u00f3n, forzar la contrase\u00f1a por fuerza bruta se vuelve relativamente f\u00e1cil. Adem\u00e1s, cada c\u00e1mara con la misma versi\u00f3n de firmware comparte la misma contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5648.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5648.json index 323b5f5353d..cef1c9aee4a 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5648.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5648.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5648", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:07.180", - "lastModified": "2024-07-09T09:15:07.180", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LearnDash LMS \u2013 Reports plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.8.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update various plugin settings." + }, + { + "lang": "es", + "value": "El complemento LearnDash LMS \u2013 Reports para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.8.2 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, actualicen varias configuraciones de complementos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5652.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5652.json index e5bfa038f98..1c395966750 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5652.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5652", "sourceIdentifier": "security@docker.com", "published": "2024-07-09T17:15:48.770", - "lastModified": "2024-07-09T17:15:48.770", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5669.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5669.json index 0d84a363c72..583393199f4 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5669.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5669.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5669", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:07.430", - "lastModified": "2024-07-09T09:15:07.430", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XPlainer \u2013 WooCommerce Product FAQ [WooCommerce Accordion FAQ Plugin] plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ffw_activate_template' function in all versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to store cross-site scripting that will trigger when viewing the dashboard templates or accessing FAQs." + }, + { + "lang": "es", + "value": " El complemento XPlainer \u2013 WooCommerce Product FAQ [WooCommerce Accordion FAQ Plugin] para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'ffw_activate_template' en todas las versiones hasta la 1.6.4 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, almacenen Cross Site Scripting que se activar\u00e1 al ver las plantillas del panel o acceder a las preguntas frecuentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5704.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5704.json index e0748503866..4e393af89b9 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5704.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5704.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5704", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:07.640", - "lastModified": "2024-07-09T09:15:07.640", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XPlainer \u2013 WooCommerce Product FAQ [WooCommerce Accordion FAQ Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add new and update existing FAQs, FAQ lists, and modify FAQ associations with products." + }, + { + "lang": "es", + "value": "El complemento XPlainer \u2013 WooCommerce Product FAQ [WooCommerce Accordion FAQ Plugin para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.6.4 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, agreguen preguntas frecuentes nuevas y actualicen listas de preguntas frecuentes existentes y modifiquen asociaciones de preguntas frecuentes con productos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5793.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5793.json index 0b5b6bf18c6..ffc0ce37eb7 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5793.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5793.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5793", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T02:15:10.240", - "lastModified": "2024-07-09T02:15:10.240", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Houzez Theme - Functionality plugin for WordPress is vulnerable to SQL Injection via the \u2018currency_code\u2019 parameter in all versions up to, and including, 3.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level (seller) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Houzez Theme - Functionality para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'currency_code' en todas las versiones hasta la 3.2.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de nivel personalizado (vendedor) y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5802.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5802.json index ea144585900..61c885b2daa 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5802.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5802.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5802", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-09T06:15:03.117", - "lastModified": "2024-07-09T06:15:03.117", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The URL Shortener by Myhop WordPress plugin through 1.0.17 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + }, + { + "lang": "es", + "value": "El complemento URL Shortener de Myhop WordPress hasta la versi\u00f3n 1.0.17 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5810.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5810.json index 35251bdee56..c2aa4823567 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5810.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5810.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5810", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:07.883", - "lastModified": "2024-07-09T09:15:07.883", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP2Speed Faster \u2013 Optimize PageSpeed Insights Score 90-100 plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.1. This is due to the use of hardcoded credentials to authenticate all the incoming API requests. This makes it possible for unauthenticated attackers to overwrite CSS, update the trial settings, purge the cache, and find attachments." + }, + { + "lang": "es", + "value": " El complemento WP2Speed Faster \u2013 Optimize PageSpeed Insights Score 90-100 para WordPress es vulnerable al acceso no autorizado en todas las versiones hasta la 1.0.1 incluida. Esto se debe al uso de credenciales codificadas para autenticar todas las solicitudes API entrantes. Esto hace posible que atacantes no autenticados sobrescriban CSS, actualicen la configuraci\u00f3n de prueba, purguen el cach\u00e9 y encuentren archivos adjuntos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5855.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5855.json index 7775742939a..a236f692eaf 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5855.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5855.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5855", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T02:15:10.437", - "lastModified": "2024-07-09T02:15:10.437", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Media Hygiene: Remove or Delete Unused Images and More! plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the bulk_action_delete and delete_single_image_call AJAX actions in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary attachments. A nonce check was added in version 3.0.1, however, it wasn't until version 3.0.2 that a capability check was added." + }, + { + "lang": "es", + "value": "El complemento Media Hygiene: Remove or Delete Unused Images and More! para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en las acciones AJAX Bulk_action_delete y delete_single_image_call en todas las versiones hasta la 3.0.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos adjuntos arbitrarios. Se agreg\u00f3 una verificaci\u00f3n nonce en la versi\u00f3n 3.0.1; sin embargo, no fue hasta la versi\u00f3n 3.0.2 que se agreg\u00f3 una verificaci\u00f3n de capacidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5856.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5856.json index 06fd828d3af..c559cf52550 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5856.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5856.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5856", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:08.103", - "lastModified": "2024-07-09T09:15:08.103", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Comment Images Reloaded plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the cir_delete_image AJAX action in all versions up to, and including, 2.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary media attachments." + }, + { + "lang": "es", + "value": "El complemento Comment Images Reloaded para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n cir_delete_image AJAX en todas las versiones hasta la 2.2.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos adjuntos multimedia arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5881.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5881.json index 19f65037ff7..0b240c4b610 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5881.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5881", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:10.800", - "lastModified": "2024-07-09T08:15:10.800", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5937.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5937.json index dbc3fc457cf..cdc3ba30ec3 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5937.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5937.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5937", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:08.490", - "lastModified": "2024-07-09T09:15:08.490", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple Alert Boxes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Alert shortcode in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Simple Alert Boxes para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto de alerta del complemento en todas las versiones hasta la 1.4.0 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5946.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5946.json index d81537142bd..5b5a0437342 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5946.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5946", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T11:15:16.400", - "lastModified": "2024-07-09T11:15:16.400", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json index 24efb16518f..7bc0bac8d77 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5971", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-08T21:15:12.480", - "lastModified": "2024-07-09T06:15:03.200", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\\r\\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Undertow, donde la respuesta fragmentada se suspende despu\u00e9s de que se lav\u00f3 el cuerpo. Los encabezados y el cuerpo de la respuesta se enviaron, pero el cliente continuar\u00eda esperando ya que Undertow no env\u00eda la terminaci\u00f3n 0\\r\\n esperada de la respuesta fragmentada. Esto da como resultado un consumo descontrolado de recursos, dejando al lado del servidor expuesto a un ataque de denegaci\u00f3n de servicio. Esto sucede solo con escenarios Java 17 TLSv1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json index 802fd4a8dc0..794cf47e9b3 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5974", "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-07-09T03:15:02.507", - "lastModified": "2024-07-09T03:15:02.507", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.\nThis issue affects Fireware OS: from 11.9.6 through 12.10.3.\n\n" + }, + { + "lang": "es", + "value": "Un desbordamiento del b\u00fafer en WatchGuard Fireware OS podr\u00eda permitir que un atacante remoto autenticado con acceso de administraci\u00f3n privilegiado ejecute c\u00f3digo arbitrario con privilegios del sistema en el firewall. Este problema afecta al sistema operativo Fireware: desde 11.9.6 hasta 12.10.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5992.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5992.json index 12142fc8386..7c1da2f9cee 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5992.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5992.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5992", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:08.727", - "lastModified": "2024-07-09T09:15:08.727", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cliengo \u2013 Chatbot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_chatbot_token' and 'update_chatbot_position' functions in all versions up to, and including, 3.0.1. This makes it possible for unauthenticated attackers to change chatbot settings, which can lead to unavailability or other changes to the chatbot." + }, + { + "lang": "es", + "value": "El complemento Cliengo \u2013 Chatbot para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones 'update_chatbot_token' y 'update_chatbot_position' en todas las versiones hasta la 3.0.1 incluida. Esto hace posible que atacantes no autenticados cambien la configuraci\u00f3n del chatbot, lo que puede provocar que el chatbot no est\u00e9 disponible u otros cambios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5993.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5993.json index 7d607b453b7..07ec99fc8c8 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5993.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5993.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5993", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:08.933", - "lastModified": "2024-07-09T09:15:08.933", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cliengo \u2013 Chatbot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_session' function in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the session token of the chatbot." + }, + { + "lang": "es", + "value": " El complemento Cliengo \u2013 Chatbot para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'update_session' en todas las versiones hasta la 3.0.1 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, actualicen el token de sesi\u00f3n del chatbot." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6069.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6069.json index e8d83e456e2..e6e7e3cdfed 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6069.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6069.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6069", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:09.130", - "lastModified": "2024-07-09T09:15:09.130", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Registration Forms \u2013 User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation/deactivation due to missing capability checks on the pieregister_install_addon, pieregister_activate_addon and pieregister_deactivate_addon functions in all versions up to, and including, 3.8.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install, activate and deactivate arbitrary plugins. As a result attackers might achieve code execution on the targeted server" + }, + { + "lang": "es", + "value": "El complemento Registration Forms \u2013 User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction para WordPress son vulnerables a la instalaci\u00f3n y activaci\u00f3n/desactivaci\u00f3n arbitraria no autorizada de complementos debido a la falta de comprobaciones de capacidad en pieregister_install_addon, pieregister_activate_addon y pieregister_deactivate_addon. funciones en todas las versiones hasta la 3.8.3.4 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, instalen, activen y desactiven complementos arbitrarios. Como resultado, los atacantes podr\u00edan lograr la ejecuci\u00f3n del c\u00f3digo en el servidor objetivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6123.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6123.json index 4945b2ef5e5..11c33813788 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6123.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6123", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:10.983", - "lastModified": "2024-07-09T08:15:10.983", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6161.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6161.json index 9d8fbf27512..910e80679c6 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6161.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6161", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:11.160", - "lastModified": "2024-07-09T08:15:11.160", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6166.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6166.json index adc873cf6f2..d2275b36e1c 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6166.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6166.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6166", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T05:15:13.543", - "lastModified": "2024-07-09T05:15:13.543", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018addons_order\u2019 parameter in all versions up to, and including, 1.5.112 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above and granted plugin setting edit permissions by an administrator, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor (Free Widgets, Addons, Templates) para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'addons_order' en todas las versiones hasta la 1.5.112 incluida debido a un escape insuficiente en el usuario proporcionado par\u00e1metro y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior y permisos de edici\u00f3n de configuraci\u00f3n de complementos otorgados por un administrador, agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6167.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6167.json index 36546dcf2f6..7dbc2b305bd 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6167.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6167.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6167", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:09.373", - "lastModified": "2024-07-09T09:15:09.373", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Just Custom Fields plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several AJAX functions in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke this functionality intended for admin users. This enables subscribers to manage field groups, change visibility of items among other things." + }, + { + "lang": "es", + "value": " El complemento Just Custom Fields para WordPress es vulnerable al acceso no autorizado de funcionalidad debido a una falta de verificaci\u00f3n de capacidad en varias funciones AJAX en todas las versiones hasta la 3.3.2 incluida. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, invoquen esta funcionalidad destinada a usuarios administradores. Esto permite a los suscriptores administrar grupos de campos, cambiar la visibilidad de los elementos, entre otras cosas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6168.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6168.json index 7265b24ae32..2e5eb73a4d1 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6168.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6168.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6168", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T09:15:09.597", - "lastModified": "2024-07-09T09:15:09.597", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Just Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on several AJAX function. This makes it possible for unauthenticated attackers to invoke this functionality intended for admin users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This enables subscribers to manage field groups, change visibility of items among other things." + }, + { + "lang": "es", + "value": "El complemento Just Custom Fields para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.3.2 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en varias funciones AJAX. Esto hace posible que atacantes no autenticados invoquen esta funcionalidad destinada a usuarios administradores a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto permite a los suscriptores administrar grupos de campos, cambiar la visibilidad de los elementos, entre otras cosas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6169.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6169.json index ec637086da4..f937fc63a3d 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6169.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6169.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6169", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T05:15:13.737", - "lastModified": "2024-07-09T05:15:13.737", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018username\u2019 parameter in all versions up to, and including, 1.5.112 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above and granted plugin setting edit permissions by an administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor (Free Widgets, Addons, Templates) para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'username' en todas las versiones hasta la 1.5.112 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior y con permisos de edici\u00f3n de configuraci\u00f3n de complementos otorgados por un administrador, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6170.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6170.json index c64e7f862ed..dbea1afe4cf 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6170.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6170.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6170", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T05:15:13.947", - "lastModified": "2024-07-09T05:15:13.947", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018email\u2019 parameter in all versions up to, and including, 1.5.112 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor (Free Widgets, Addons, Templates) para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'email' en todas las versiones hasta la 1.5.112 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6171.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6171.json index 8c61a40f22c..96507c56af9 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6171.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6171.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6171", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T05:15:14.140", - "lastModified": "2024-07-09T05:15:14.140", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 1.5.112 due to insufficient IP address validation and/or use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to bypass antispam functionality in the Form Builder widgets." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor (Free Widgets, Addons, Templates) para WordPress es vulnerable a la suplantaci\u00f3n de direcciones IP en todas las versiones hasta la 1.5.112 incluida debido a una validaci\u00f3n insuficiente de la direcci\u00f3n IP y/o al uso de encabezados HTTP proporcionados por el usuario. como m\u00e9todo principal para la recuperaci\u00f3n de IP. Esto hace posible que atacantes no autenticados omitan la funcionalidad antispam en los widgets de Form Builder." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6180.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6180.json index 83983024ec8..8b20756665b 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6180.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6180", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:11.350", - "lastModified": "2024-07-09T08:15:11.350", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6222.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6222.json new file mode 100644 index 00000000000..64993fb8dc5 --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6222.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6222", + "sourceIdentifier": "security@docker.com", + "published": "2024-07-09T18:15:12.510", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.\n\nDocker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.\n\nAs exploitation requires \"Allow only extensions distributed through the Docker Marketplace\" to be disabled, Docker Desktop\u00a0 v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 \u00a0additionally changes the default configuration to enable this setting by default." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@docker.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.3, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@docker.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://docs.docker.com/desktop/release-notes/#4290", + "source": "security@docker.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6227.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6227.json index c6dfe0f90e7..d3dadcd9d19 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6227.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6227.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6227", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-08T19:15:10.673", - "lastModified": "2024-07-08T19:15:10.673", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to cause a denial of service by configuring the remote tracking server to point at itself. This results in the server endlessly connecting to itself, rendering it unable to respond to other connections." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en aimhubio/aim versi\u00f3n 3.19.3 permite a un atacante provocar una denegaci\u00f3n de servicio configurando el servidor de seguimiento remoto para que apunte a s\u00ed mismo. Esto da como resultado que el servidor se conecte interminablemente consigo mismo, lo que le impide responder a otras conexiones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json index 73e0cc12c56..22811a4232f 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6237", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-09T17:15:48.960", - "lastModified": "2024-07-09T17:15:48.960", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579", "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/389ds/389-ds-base/issues/5989", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6309.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6309.json index d0e72a7a603..d2dbcf2a6fb 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6309.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6309.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6309", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:11.550", - "lastModified": "2024-07-09T08:15:11.550", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6310.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6310.json index 5e61289fa9d..6652002d0b5 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6310.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6310", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:11.733", - "lastModified": "2024-07-09T08:15:11.733", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6313.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6313.json index 84262f12f58..d65908ac6b0 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6313.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6313", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:11.907", - "lastModified": "2024-07-09T08:15:11.907", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6314.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6314.json index 91086fdbf09..185e6cf4ccf 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6314.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6314", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.090", - "lastModified": "2024-07-09T08:15:12.090", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json index 49931a4fa19..85af897833b 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6316", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.270", - "lastModified": "2024-07-09T08:15:12.270", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json index 43881599a2e..d80541d8647 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6317", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.470", - "lastModified": "2024-07-09T08:15:12.470", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6320.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6320.json index fbec0832bca..4d0adef5ae8 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6320.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6320.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6320", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.643", - "lastModified": "2024-07-09T08:15:12.643", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6321.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6321.json index 6486cbfa007..e6a9d738727 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6321.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6321", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.843", - "lastModified": "2024-07-09T08:15:12.843", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento ScrollTo Bottom para WordPress es vulnerable a Cross-Site Request Forgery para la carga arbitraria de archivos en versiones hasta la 1.1.1 inclusive. Esto se debe a que falta la validaci\u00f3n nonce y la validaci\u00f3n del tipo de archivo en la funci\u00f3n 'options_page'. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." + "value": "El complemento ScrollTo Bottom para WordPress es vulnerable a Cross-Site Request Forgery para la carga arbitraria de archivos en versiones hasta la 1.1.1 incluida. Esto se debe a que falta la validaci\u00f3n nonce y la validaci\u00f3n del tipo de archivo en la funci\u00f3n 'options_page'. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6334.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6334.json index 497c4284dd2..3a36a9fa29a 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6334.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6334", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-09T06:15:03.383", - "lastModified": "2024-07-09T06:15:03.383", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Table of Contents WordPress plugin before 2.0.67.1 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed." + }, + { + "lang": "es", + "value": "El complemento Easy Table of Contents de WordPress anterior a 2.0.67.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como editores, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6365.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6365.json index 27154775c53..dd223b6dc85 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6365.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6365.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6365", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T04:15:15.333", - "lastModified": "2024-07-09T04:15:15.333", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Product Table by WBW plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.1 via the 'saveCustomTitle' function. This is due to missing authorization and lack of sanitization of appended data in the languages/customTitle.php file. This makes it possible for unauthenticated attackers to execute code on the server." + }, + { + "lang": "es", + "value": "El complemento Product Table by WBW para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo en todas las versiones hasta la 2.0.1 incluida a trav\u00e9s de la funci\u00f3n 'saveCustomTitle'. Esto se debe a la falta de autorizaci\u00f3n y a la falta de sanitizaci\u00f3n de los datos adjuntos en el archivo language/customTitle.php. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digo en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6391.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6391.json index cb549a62812..40cb15ebbcb 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6391.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6391", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T12:15:21.093", - "lastModified": "2024-07-09T12:15:21.093", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6409.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6409.json index 23d05a20ba4..964250d84db 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6409.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-08T18:15:09.487", - "lastModified": "2024-07-09T15:15:12.140", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6527.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6527.json index b59bc1b349f..e33ee00bf05 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6527.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6527", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-09T14:15:04.667", - "lastModified": "2024-07-09T14:15:04.667", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6580.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6580.json index 9b154688a2f..49ebc339c29 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6580.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6580.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6580", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-07-08T19:15:10.913", - "lastModified": "2024-07-08T19:15:10.913", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application).\u00a0IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates." + }, + { + "lang": "es", + "value": "Se puede inducir al componente SFTPServer de la librer\u00eda SSH de IPWorks del software /n a realizar solicitudes no deseadas de ruta de red o de sistema de archivos al cargar un certificado o clave p\u00fablica SSH. Para ser explotable, una aplicaci\u00f3n que llama al componente SFTPServer debe otorgar acceso al usuario sin verificar la clave p\u00fablica o el certificado SSH (lo que probablemente ser\u00eda una vulnerabilidad separada en la aplicaci\u00f3n que llama). Las versiones 22.0.8945 y 24.0.8945 de IPWorks SSH se lanzaron para abordar esta condici\u00f3n mediante el bloqueo de todas las solicitudes de rutas de red y sistemas de archivos para claves p\u00fablicas o certificados SSH." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6598.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6598.json index 3e975338441..8c1c8b0e0ff 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6598.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6598", "sourceIdentifier": "security@knime.com", "published": "2024-07-09T14:15:04.803", - "lastModified": "2024-07-09T14:15:04.803", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json index f6ff2c57136..07784e9c67d 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6600", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.273", - "lastModified": "2024-07-09T15:15:12.273", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json index 6fdfd0479b5..e07b90a98f6 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6601", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.410", - "lastModified": "2024-07-09T15:15:12.410", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json index 00a1d5d4820..e01e0b50c75 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6602", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.473", - "lastModified": "2024-07-09T15:15:12.473", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json index 47772d2375c..67f8ea32a56 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6603", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.533", - "lastModified": "2024-07-09T15:15:12.533", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:19:14.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json index b0df8b76432..a187faa3eb1 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6604", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.597", - "lastModified": "2024-07-09T15:15:12.597", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json index 8132ca8fbbf..6bce191cd3a 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6605", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.660", - "lastModified": "2024-07-09T15:15:12.660", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json index cdceb8404b5..6b52a44ca1d 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6606", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.727", - "lastModified": "2024-07-09T15:15:12.727", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6607.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6607.json index de3b41b7a7c..62f729fc4ad 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6607.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6607", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.790", - "lastModified": "2024-07-09T15:15:12.790", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6608.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6608.json index a725527223d..3e1ecdb210f 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6608.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6608.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6608", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.863", - "lastModified": "2024-07-09T15:15:12.863", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6609.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6609.json index 999d72db1db..4dcc1e26570 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6609.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6609.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6609", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.923", - "lastModified": "2024-07-09T15:15:12.923", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6610.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6610.json index 3cb1c832ac1..53c0243d01a 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6610.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6610.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6610", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.983", - "lastModified": "2024-07-09T15:15:12.983", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json index 8524d3fa33d..49cb4f480cf 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6611", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.047", - "lastModified": "2024-07-09T15:15:13.047", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json index 699e75acfab..6b14df11af4 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6612", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.107", - "lastModified": "2024-07-09T15:15:13.107", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json index 98e643b95f6..79e9a9d5822 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6613", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.170", - "lastModified": "2024-07-09T15:15:13.170", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json index 0dfa207db53..65015c2d344 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6614", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.237", - "lastModified": "2024-07-09T15:15:13.237", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json index e92c33d1157..2f57683d0e7 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6615", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.307", - "lastModified": "2024-07-09T15:15:13.307", - "vulnStatus": "Received", + "lastModified": "2024-07-09T18:18:38.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 802bfd87085..16fedc5a66a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-09T18:00:19.387334+00:00 +2024-07-09T20:00:19.076178+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-09T17:41:10.523000+00:00 +2024-07-09T19:15:13.853000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256394 +256437 ``` ### CVEs added in the last Commit -Recently added CVEs: `160` +Recently added CVEs: `43` -- [CVE-2024-38077](CVE-2024/CVE-2024-380xx/CVE-2024-38077.json) (`2024-07-09T17:15:42.430`) -- [CVE-2024-38078](CVE-2024/CVE-2024-380xx/CVE-2024-38078.json) (`2024-07-09T17:15:42.770`) -- [CVE-2024-38079](CVE-2024/CVE-2024-380xx/CVE-2024-38079.json) (`2024-07-09T17:15:43.077`) -- [CVE-2024-38080](CVE-2024/CVE-2024-380xx/CVE-2024-38080.json) (`2024-07-09T17:15:43.410`) -- [CVE-2024-38081](CVE-2024/CVE-2024-380xx/CVE-2024-38081.json) (`2024-07-09T17:15:43.750`) -- [CVE-2024-38085](CVE-2024/CVE-2024-380xx/CVE-2024-38085.json) (`2024-07-09T17:15:44.080`) -- [CVE-2024-38086](CVE-2024/CVE-2024-380xx/CVE-2024-38086.json) (`2024-07-09T17:15:44.373`) -- [CVE-2024-38087](CVE-2024/CVE-2024-380xx/CVE-2024-38087.json) (`2024-07-09T17:15:44.673`) -- [CVE-2024-38088](CVE-2024/CVE-2024-380xx/CVE-2024-38088.json) (`2024-07-09T17:15:44.933`) -- [CVE-2024-38089](CVE-2024/CVE-2024-380xx/CVE-2024-38089.json) (`2024-07-09T17:15:45.170`) -- [CVE-2024-38091](CVE-2024/CVE-2024-380xx/CVE-2024-38091.json) (`2024-07-09T17:15:45.380`) -- [CVE-2024-38092](CVE-2024/CVE-2024-380xx/CVE-2024-38092.json) (`2024-07-09T17:15:45.633`) -- [CVE-2024-38094](CVE-2024/CVE-2024-380xx/CVE-2024-38094.json) (`2024-07-09T17:15:46.090`) -- [CVE-2024-38095](CVE-2024/CVE-2024-380xx/CVE-2024-38095.json) (`2024-07-09T17:15:46.313`) -- [CVE-2024-38099](CVE-2024/CVE-2024-380xx/CVE-2024-38099.json) (`2024-07-09T17:15:46.517`) -- [CVE-2024-38100](CVE-2024/CVE-2024-381xx/CVE-2024-38100.json) (`2024-07-09T17:15:46.770`) -- [CVE-2024-38101](CVE-2024/CVE-2024-381xx/CVE-2024-38101.json) (`2024-07-09T17:15:46.977`) -- [CVE-2024-38102](CVE-2024/CVE-2024-381xx/CVE-2024-38102.json) (`2024-07-09T17:15:47.187`) -- [CVE-2024-38104](CVE-2024/CVE-2024-381xx/CVE-2024-38104.json) (`2024-07-09T17:15:47.410`) -- [CVE-2024-38105](CVE-2024/CVE-2024-381xx/CVE-2024-38105.json) (`2024-07-09T17:15:47.640`) -- [CVE-2024-38112](CVE-2024/CVE-2024-381xx/CVE-2024-38112.json) (`2024-07-09T17:15:47.860`) -- [CVE-2024-39118](CVE-2024/CVE-2024-391xx/CVE-2024-39118.json) (`2024-07-09T17:15:48.153`) -- [CVE-2024-39171](CVE-2024/CVE-2024-391xx/CVE-2024-39171.json) (`2024-07-09T17:15:48.367`) -- [CVE-2024-5652](CVE-2024/CVE-2024-56xx/CVE-2024-5652.json) (`2024-07-09T17:15:48.770`) -- [CVE-2024-6237](CVE-2024/CVE-2024-62xx/CVE-2024-6237.json) (`2024-07-09T17:15:48.960`) +- [CVE-2024-39899](CVE-2024/CVE-2024-398xx/CVE-2024-39899.json) (`2024-07-09T19:15:13.160`) +- [CVE-2024-40034](CVE-2024/CVE-2024-400xx/CVE-2024-40034.json) (`2024-07-09T19:15:13.373`) +- [CVE-2024-40035](CVE-2024/CVE-2024-400xx/CVE-2024-40035.json) (`2024-07-09T19:15:13.450`) +- [CVE-2024-40036](CVE-2024/CVE-2024-400xx/CVE-2024-40036.json) (`2024-07-09T19:15:13.527`) +- [CVE-2024-40037](CVE-2024/CVE-2024-400xx/CVE-2024-40037.json) (`2024-07-09T19:15:13.600`) +- [CVE-2024-40038](CVE-2024/CVE-2024-400xx/CVE-2024-40038.json) (`2024-07-09T19:15:13.677`) +- [CVE-2024-40039](CVE-2024/CVE-2024-400xx/CVE-2024-40039.json) (`2024-07-09T19:15:13.750`) +- [CVE-2024-40726](CVE-2024/CVE-2024-407xx/CVE-2024-40726.json) (`2024-07-09T18:15:11.110`) +- [CVE-2024-40727](CVE-2024/CVE-2024-407xx/CVE-2024-40727.json) (`2024-07-09T18:15:11.187`) +- [CVE-2024-40728](CVE-2024/CVE-2024-407xx/CVE-2024-40728.json) (`2024-07-09T18:15:11.270`) +- [CVE-2024-40729](CVE-2024/CVE-2024-407xx/CVE-2024-40729.json) (`2024-07-09T18:15:11.353`) +- [CVE-2024-40730](CVE-2024/CVE-2024-407xx/CVE-2024-40730.json) (`2024-07-09T18:15:11.440`) +- [CVE-2024-40731](CVE-2024/CVE-2024-407xx/CVE-2024-40731.json) (`2024-07-09T18:15:11.520`) +- [CVE-2024-40732](CVE-2024/CVE-2024-407xx/CVE-2024-40732.json) (`2024-07-09T18:15:11.610`) +- [CVE-2024-40733](CVE-2024/CVE-2024-407xx/CVE-2024-40733.json) (`2024-07-09T18:15:11.700`) +- [CVE-2024-40734](CVE-2024/CVE-2024-407xx/CVE-2024-40734.json) (`2024-07-09T18:15:11.787`) +- [CVE-2024-40735](CVE-2024/CVE-2024-407xx/CVE-2024-40735.json) (`2024-07-09T18:15:11.867`) +- [CVE-2024-40736](CVE-2024/CVE-2024-407xx/CVE-2024-40736.json) (`2024-07-09T18:15:11.947`) +- [CVE-2024-40737](CVE-2024/CVE-2024-407xx/CVE-2024-40737.json) (`2024-07-09T18:15:12.030`) +- [CVE-2024-40738](CVE-2024/CVE-2024-407xx/CVE-2024-40738.json) (`2024-07-09T18:15:12.107`) +- [CVE-2024-40739](CVE-2024/CVE-2024-407xx/CVE-2024-40739.json) (`2024-07-09T18:15:12.187`) +- [CVE-2024-40740](CVE-2024/CVE-2024-407xx/CVE-2024-40740.json) (`2024-07-09T18:15:12.267`) +- [CVE-2024-40741](CVE-2024/CVE-2024-407xx/CVE-2024-40741.json) (`2024-07-09T18:15:12.350`) +- [CVE-2024-40742](CVE-2024/CVE-2024-407xx/CVE-2024-40742.json) (`2024-07-09T18:15:12.430`) +- [CVE-2024-6222](CVE-2024/CVE-2024-62xx/CVE-2024-6222.json) (`2024-07-09T18:15:12.510`) ### CVEs modified in the last Commit -Recently modified CVEs: `55` +Recently modified CVEs: `395` -- [CVE-2024-39021](CVE-2024/CVE-2024-390xx/CVE-2024-39021.json) (`2024-07-09T17:15:48.083`) -- [CVE-2024-39023](CVE-2024/CVE-2024-390xx/CVE-2024-39023.json) (`2024-07-09T16:22:49.943`) -- [CVE-2024-39178](CVE-2024/CVE-2024-391xx/CVE-2024-39178.json) (`2024-07-09T16:22:51.013`) -- [CVE-2024-39210](CVE-2024/CVE-2024-392xx/CVE-2024-39210.json) (`2024-07-09T16:22:51.927`) -- [CVE-2024-39220](CVE-2024/CVE-2024-392xx/CVE-2024-39220.json) (`2024-07-09T16:22:52.750`) -- [CVE-2024-39223](CVE-2024/CVE-2024-392xx/CVE-2024-39223.json) (`2024-07-09T16:22:53.590`) -- [CVE-2024-39929](CVE-2024/CVE-2024-399xx/CVE-2024-39929.json) (`2024-07-09T16:22:58.760`) -- [CVE-2024-39931](CVE-2024/CVE-2024-399xx/CVE-2024-39931.json) (`2024-07-09T16:22:59.140`) -- [CVE-2024-39937](CVE-2024/CVE-2024-399xx/CVE-2024-39937.json) (`2024-07-09T16:23:00.340`) -- [CVE-2024-40596](CVE-2024/CVE-2024-405xx/CVE-2024-40596.json) (`2024-07-09T16:45:08.760`) -- [CVE-2024-40598](CVE-2024/CVE-2024-405xx/CVE-2024-40598.json) (`2024-07-09T16:45:38.957`) -- [CVE-2024-40599](CVE-2024/CVE-2024-405xx/CVE-2024-40599.json) (`2024-07-09T16:46:25.257`) -- [CVE-2024-40600](CVE-2024/CVE-2024-406xx/CVE-2024-40600.json) (`2024-07-09T16:52:29.877`) -- [CVE-2024-40602](CVE-2024/CVE-2024-406xx/CVE-2024-40602.json) (`2024-07-09T16:36:43.890`) -- [CVE-2024-40603](CVE-2024/CVE-2024-406xx/CVE-2024-40603.json) (`2024-07-09T16:37:50.650`) -- [CVE-2024-40604](CVE-2024/CVE-2024-406xx/CVE-2024-40604.json) (`2024-07-09T16:39:36.983`) -- [CVE-2024-40605](CVE-2024/CVE-2024-406xx/CVE-2024-40605.json) (`2024-07-09T16:09:30.277`) -- [CVE-2024-40614](CVE-2024/CVE-2024-406xx/CVE-2024-40614.json) (`2024-07-09T17:11:55.077`) -- [CVE-2024-4418](CVE-2024/CVE-2024-44xx/CVE-2024-4418.json) (`2024-07-09T17:15:48.507`) -- [CVE-2024-4467](CVE-2024/CVE-2024-44xx/CVE-2024-4467.json) (`2024-07-09T17:15:48.647`) -- [CVE-2024-5570](CVE-2024/CVE-2024-55xx/CVE-2024-5570.json) (`2024-07-09T16:23:05.823`) -- [CVE-2024-5729](CVE-2024/CVE-2024-57xx/CVE-2024-5729.json) (`2024-07-09T16:23:06.837`) -- [CVE-2024-5767](CVE-2024/CVE-2024-57xx/CVE-2024-5767.json) (`2024-07-09T16:23:07.280`) -- [CVE-2024-5942](CVE-2024/CVE-2024-59xx/CVE-2024-5942.json) (`2024-07-09T16:02:08.180`) -- [CVE-2024-6095](CVE-2024/CVE-2024-60xx/CVE-2024-6095.json) (`2024-07-09T17:41:10.523`) +- [CVE-2024-6320](CVE-2024/CVE-2024-63xx/CVE-2024-6320.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6321](CVE-2024/CVE-2024-63xx/CVE-2024-6321.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6334](CVE-2024/CVE-2024-63xx/CVE-2024-6334.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6365](CVE-2024/CVE-2024-63xx/CVE-2024-6365.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6391](CVE-2024/CVE-2024-63xx/CVE-2024-6391.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6409](CVE-2024/CVE-2024-64xx/CVE-2024-6409.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6527](CVE-2024/CVE-2024-65xx/CVE-2024-6527.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6580](CVE-2024/CVE-2024-65xx/CVE-2024-6580.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6598](CVE-2024/CVE-2024-65xx/CVE-2024-6598.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6600](CVE-2024/CVE-2024-66xx/CVE-2024-6600.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6601](CVE-2024/CVE-2024-66xx/CVE-2024-6601.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6602](CVE-2024/CVE-2024-66xx/CVE-2024-6602.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6603](CVE-2024/CVE-2024-66xx/CVE-2024-6603.json) (`2024-07-09T18:19:14.047`) +- [CVE-2024-6604](CVE-2024/CVE-2024-66xx/CVE-2024-6604.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6605](CVE-2024/CVE-2024-66xx/CVE-2024-6605.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6606](CVE-2024/CVE-2024-66xx/CVE-2024-6606.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6607](CVE-2024/CVE-2024-66xx/CVE-2024-6607.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6608](CVE-2024/CVE-2024-66xx/CVE-2024-6608.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6609](CVE-2024/CVE-2024-66xx/CVE-2024-6609.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6610](CVE-2024/CVE-2024-66xx/CVE-2024-6610.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6611](CVE-2024/CVE-2024-66xx/CVE-2024-6611.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6612](CVE-2024/CVE-2024-66xx/CVE-2024-6612.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6613](CVE-2024/CVE-2024-66xx/CVE-2024-6613.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6614](CVE-2024/CVE-2024-66xx/CVE-2024-6614.json) (`2024-07-09T18:18:38.713`) +- [CVE-2024-6615](CVE-2024/CVE-2024-66xx/CVE-2024-6615.json) (`2024-07-09T18:18:38.713`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d42669768bc..c172378e1ec 100644 --- a/_state.csv +++ b/_state.csv @@ -46012,7 +46012,7 @@ CVE-2010-4394,0,0,5b04db8c59be18ebf503a2da60ea3faf63e6bb917b2477a93e3bc0c273789a CVE-2010-4395,0,0,2b42fd57d639634df015cb939721f2424d03c52196ac4e262109af89b45c5283,2011-01-19T07:02:16.333000 CVE-2010-4396,0,0,f525b045388d005311ed8a593f1a045972ebfd28d33f7dd13d34efcc091a6fdb,2011-01-19T07:02:16.537000 CVE-2010-4397,0,0,680974bc8fc12be4da5bfe2ee7ccd44b7e94b58164757fe83be76fa993c64435,2011-01-19T07:02:16.800000 -CVE-2010-4398,0,0,2074351265b71f42990f3fe1d3223b6e9b7995b6d25483e32f2cecf4694ad39a,2018-10-12T21:59:03.130000 +CVE-2010-4398,0,1,c9443cf246adecc7712315ba467a0d47f3a522e3e986b1dcf6b95e1dd05903be,2024-07-09T18:24:01.497000 CVE-2010-4399,0,0,329658e59a87445eebef9addda44c4cb12c6763c4c07b30fbeec7e695860f139,2021-03-25T15:05:50.170000 CVE-2010-4400,0,0,d92b7c432653f85f7f097bedc591c86cb5e59d08724f76cbd1dfbb11331ff3cc,2021-03-25T15:05:31.247000 CVE-2010-4401,0,0,ce6a5963b4655da536ab2f64c2e4a2ff2575a1660662baeb1016fc7818a5a8b9,2021-03-25T15:05:31.247000 @@ -48769,7 +48769,7 @@ CVE-2011-2001,0,0,2f6b3e494de63acb1d1bd81f9b515527198f7f32ac79d26f03feb98c7815d8 CVE-2011-2002,0,0,3c0cc3ff470c91d6bf28c98b6b18905fb0a285f3c28e480f3be98946491f6d95,2023-12-07T18:38:56.693000 CVE-2011-2003,0,0,43f8b668a62a449e98c2b28d131913b4398d3fe6cf7b2078f64d804f13a5361b,2023-12-07T18:38:56.693000 CVE-2011-2004,0,0,a8e7c8e0b4a0a8df4e3000758a22e8ffa71d60c11ab32f587a517bff9a47c414,2020-09-28T12:58:30.503000 -CVE-2011-2005,0,0,5f5ae604dfc2fc6fce6d578e17055ce0308ff8f4ba5d7cca7619c7546097d4e4,2019-02-26T14:04:00.993000 +CVE-2011-2005,0,1,9ca19494c936fadcf8617dad4eb3310fa0b839e99cbfd9afed8c2b440c4ea8c2,2024-07-09T18:23:38.187000 CVE-2011-2006,0,0,db4a359926a10c16f63aa8cd0712efddc2e090db50d9d8020578084bb513e35d,2023-11-07T02:07:19.323000 CVE-2011-2007,0,0,6ba997321068cf7aa6c34166e2c99830ee33ad7db8afca4e8be76acbc4c6a0ef,2018-10-12T22:01:24.160000 CVE-2011-2008,0,0,01604ddc98791fbd6124dd166370568849deea0612222e52bf2b8172b1179070,2018-10-12T22:01:24.410000 @@ -52282,7 +52282,7 @@ CVE-2012-0514,0,0,30bd7c8283d78b4ea9314eff83cd0d4e2854bc957430a27e618ddcc7f74a34 CVE-2012-0515,0,0,f9de0044eb559a1c2ccfa664a12d0bc7f0dc990fd9e1a5d5669b9129ee50d961,2017-12-07T02:29:08.397000 CVE-2012-0516,0,0,1aa6157db3f4e97e0b0853808379b4884cc27644d86bcedaef4c001c96d26690,2017-12-13T02:29:02.107000 CVE-2012-0517,0,0,f0b3a0f1f71ecf18e15d20c6c8539bae41575ac94243f2ad9d2ce2803e8cc86b,2017-12-07T02:29:08.443000 -CVE-2012-0518,0,0,e4a3d6fa8a7e6d65fb3af94ca69453bdb299963d66b7bb9103de595cb9d1285f,2016-11-28T19:07:49.820000 +CVE-2012-0518,0,1,e3aa3088ed454386a9e9879d98c78bd3941236b80a224fc1dabd3ec3e628a766,2024-07-09T18:26:11.997000 CVE-2012-0519,0,0,3a3ae3cf7e830a285c885c95d0d21cf26c4611a9244e8ab6243dd91ffafd8c2f,2017-09-09T01:29:01.003000 CVE-2012-0520,0,0,25fd9d578eb455ada5fd51f61cdf17d02e6a460af0289780586b8c4a07e87a83,2013-10-11T03:40:53.330000 CVE-2012-0521,0,0,a6f46533706ec2a0a152f60e4d45d1174b1916f00880b8a8dac76cbb5a2a70a5,2017-12-07T02:29:08.507000 @@ -54107,7 +54107,7 @@ CVE-2012-2535,0,0,2fe6bf255459979cfbcd82f68ef9836aace8ebafe29ad9a729e9cdfa7aef67 CVE-2012-2536,0,0,2394c04d965296a91eb95e7011949d76970e4b04c8fd3d8f803afa02da3d5210,2018-10-12T22:03:08.013000 CVE-2012-2537,0,0,4565862fec7e4bb829e35f554617c2989543de17d75fa0d0bcb7efa298f99f8b,2023-11-07T02:10:35.650000 CVE-2012-2538,0,0,66caf7ed2f38e5af3325fb9ea9e18c25f118c4e4310192c8f6a2576bed3e8653,2023-11-07T02:10:35.870000 -CVE-2012-2539,0,0,521590a8f570ccd7a2e356980635d7cbec7fa8f975a0c19917613628f86bf95a,2018-10-12T22:03:08.390000 +CVE-2012-2539,0,1,16ee52a7b957e33728849e4893ea469a8c789062479a289eb17dadc1e3487e6f,2024-07-09T18:23:09.950000 CVE-2012-2540,0,0,86f3d1164eef671638d5f7b2378464d03beead12dffa671c0432a4e013c4f0cd,2023-11-07T02:10:36.107000 CVE-2012-2541,0,0,f27e3c1f9d03065721e8334419ac48147a87a479f7b1f53c24cf841d14983535,2023-11-07T02:10:36.333000 CVE-2012-2542,0,0,a7fc4bb9290e70705f3184d3c4d68867dd900fe95873bc3528179244c8a85ff7,2023-11-07T02:10:36.557000 @@ -59309,7 +59309,7 @@ CVE-2013-1686,0,0,c48e8a24f6581b5b81182a43c4931ef7082a079480d0a8a9835a00351c5cdd CVE-2013-1687,0,0,5bc218568e7a8227f4b9b2572db9390572540bb3e7e8e7cb649d2ef67374ff62,2017-09-19T01:36:10.810000 CVE-2013-1688,0,0,ba515c341c1560fb2a21e33a2f5448c6f8835032aba860e0660f6c3fc207301f,2017-09-19T01:36:10.873000 CVE-2013-1689,0,0,b5e0737361b2a827dd4c2ceb304da82263c1694dcbdb34c56ede01ce9a4bffa3,2019-12-13T00:22:51.177000 -CVE-2013-1690,0,0,dfe63c5eb4a37d129c44038975c2ed5ef0650cebb403d83b8d37530c8ec539b5,2017-09-19T01:36:10.950000 +CVE-2013-1690,0,1,c35c2e4520974353971af1cd1c15137a27864e2885577b76db7aad653a91a3f8,2024-07-09T18:25:57.940000 CVE-2013-1692,0,0,e2af43886fb48ad686c94f435cf13504c211cdbde50c641051792be0eccc8a2f,2017-09-19T01:36:11.030000 CVE-2013-1693,0,0,fe32d15b482fcc1aca9d1794619e908d623c874bfd29106fed17a71b2a411167,2017-09-19T01:36:11.123000 CVE-2013-1694,0,0,fa6501b51450693a6b8a5b77d75024be3567b9365361318a2ed633305ac35746,2017-09-19T01:36:11.200000 @@ -60110,7 +60110,7 @@ CVE-2013-2547,0,0,461bf4d4e4a1aba9357ca3475b9ff83f79edda9c85122b35ea3cbc38bd3405 CVE-2013-2548,0,0,7d4e3cae625d0d13e78cd4fa3ee8e7c706c320c59a85a1d7b2b0bf1679f2e47e,2023-11-07T02:15:04.360000 CVE-2013-2549,0,0,444c48aa259cfe28cc3dcb0706137d7859a5908d13b22c0ec2ed0d23c5fe9de5,2017-09-19T01:36:24.437000 CVE-2013-2550,0,0,9b467655b2215aaafeb98e7cb79b451d2c11d8f082b0634f1474050cbb7ad2fa,2017-09-19T01:36:24.497000 -CVE-2013-2551,0,0,38404fa4dfbd989dacaf0c64e6c8474d6234da4871b1330e36ce44177c9c25e9,2018-10-12T22:04:23.617000 +CVE-2013-2551,0,1,1da23b502161fe6d0c6b5cba8e2e293ee8cb574e12387083a2e6174806c70d73,2024-07-09T18:22:54.570000 CVE-2013-2552,0,0,af48b202ad1ea7e4c8682bbfaa7d70cd456e70b51a1f13c25465bb105c33f3bf,2013-03-16T04:00:00 CVE-2013-2553,0,0,ceff85388c51f1ed237bf3798e3612ce476f4a1f2bf450cd049030d89059fbd2,2018-10-30T16:27:21.030000 CVE-2013-2554,0,0,b6487d19ca6dc896558b2cdac60d84e4d040bb42e169cd45df83592c18a779e2,2018-10-30T16:27:21.030000 @@ -60244,7 +60244,7 @@ CVE-2013-2725,0,0,6d022f4921151189a15cf9babd24104f3443d1ebf8e9a3b14f1415e40b55c7 CVE-2013-2726,0,0,714571e07900cb5a7808d36416ce166164e7265e5087023aa61fee5147deb5c7,2017-09-19T01:36:25.403000 CVE-2013-2727,0,0,debb17b9abecec1b47d33061c370ac0bc59afd4e2ef29631da095644f8b8230e,2017-09-19T01:36:25.497000 CVE-2013-2728,0,0,ec6fc54b1a937251492ebf16c416e8c12f1a7a7279ee8b49a9e1a89a4e7c586c,2020-08-25T13:10:17.427000 -CVE-2013-2729,0,0,9ebca919313a307ff72c842ddab17903a641d577f1228d0173b58c649efe48c4,2017-09-19T01:36:25.733000 +CVE-2013-2729,0,1,20b69e49d70ff15b316f71793e8c267bcb3bb91073f3abdf2b8094719d7108a3,2024-07-09T18:22:32.587000 CVE-2013-2730,0,0,9322b935ebeedad6c5e403022e337403b1b1d5234335350b41ecb9652114fbcb,2017-09-19T01:36:25.827000 CVE-2013-2731,0,0,5f4add7dd2a6e7c312c7ce99507fb10399abd31506200377b289fa0565a3398e,2017-09-19T01:36:25.903000 CVE-2013-2732,0,0,5c7080fe40d38d713fcfddc85ef7d419e752d480a43617caaf19474e650dd6d4,2017-09-19T01:36:25.983000 @@ -61084,7 +61084,7 @@ CVE-2013-3656,0,0,9406ab144d8bf2a7626576a0f618ed31316afdc743f3facbda914f5d1fdbe4 CVE-2013-3657,0,0,4bbd8465822bb2f3bc380b2a65000d831c611c6d36757fca6e4337d0ecc90c5e,2013-09-13T18:01:12.967000 CVE-2013-3658,0,0,afba456d66c97a7f36682f89da3c1f477701b0742455c156daf1510418245410,2013-09-12T17:07:16.097000 CVE-2013-3659,0,0,3a5013fcc305408d13d97e26c9c255cedd1497423dfea06b9ceba28da67e3374,2017-08-29T01:33:25.717000 -CVE-2013-3660,0,0,66630707da807725364ff4e99af6fff679881b14d5e09ee7ef9fd31ef2342aea,2019-02-26T14:04:02.353000 +CVE-2013-3660,0,1,bb4934137ffba241096f8537fc58f2ee39d9a301e17222f3884bd2089355cc2d,2024-07-09T18:25:48.790000 CVE-2013-3661,0,0,d848b2e7365a16bc60c4bc10abbc8f25fd8243008d59e04eee49cbd0adba5a04,2019-02-26T14:04:02.353000 CVE-2013-3662,0,0,a3cfe0d870e21b1bd57256f5834c46ce14919ca2668bfdb16c5a381778d20131,2017-08-29T01:33:25.777000 CVE-2013-3663,0,0,1a05f2a845c2bd411a4263c54e7c216e3bcceb1b68b1ab13a4a2aee9ca026416,2017-08-29T01:33:25.857000 @@ -75254,7 +75254,7 @@ CVE-2015-1766,0,0,bb1aa4c93b1b21d38865596c9ee4333bf1d71807ecb3bf67053d05d7236c86 CVE-2015-1767,0,0,d8e8b9e27375af3b4e88c9be5861affea3bf8e2d845ea279841801e2ad017b98,2018-10-12T22:09:11.153000 CVE-2015-1768,0,0,16cd6aa3991da5fd57bb3274ae5e66d891abf55f05e7ccfb9d5b34cb86969efa,2019-02-26T14:04:02.387000 CVE-2015-1769,0,0,ce3393458b6962b182084bc3963a44186a00feb04dff62916457cbedf11df73e,2019-05-14T19:38:54.297000 -CVE-2015-1770,0,0,3422501d5a2684800cf9a1c4f22074e9b8c94b12ffb4d6f8959428c094f6e6ad,2018-10-12T22:09:12.167000 +CVE-2015-1770,0,1,26f4eff8a8aba3b498d5117a507c015df9dc67115de4876945c5c7de5de2646a,2024-07-09T18:27:09.967000 CVE-2015-1771,0,0,c7dfc50c1af47a4c6692815abda61d96080f18f1553ab079f3f85419e281236d,2018-10-12T22:09:12.590000 CVE-2015-1772,0,0,e6aed9e0de0fdb02abfb3cb6a49390677448509f8379d2d57c3d28438fd898c3,2023-11-07T02:24:55.250000 CVE-2015-1773,0,0,1e3829ef11cdfa0d586d5d1339cd637d3a64e12d6d273320eb442b0cd81a0f1f,2015-10-05T21:33:11.160000 @@ -75842,7 +75842,7 @@ CVE-2015-2415,0,0,32ea01a5a2424e60176b1eac7491fe64547a2de10b29f3d18817ea90c7c978 CVE-2015-2416,0,0,333f94453aa8a616bec8afe65255cc30a5dc965c63898ba4827cfad54dee2613,2019-05-08T22:03:15.720000 CVE-2015-2417,0,0,2cd9d2384e9099540fdabcd08e0cf9d1a6f575ecc8bb19066ddd474c2f1ef3c3,2019-05-08T22:03:15.720000 CVE-2015-2418,0,0,402e983cbe2aa0a9b56a1682ea796f83dc08ecedeaa3c272532a05230ac0084f,2021-08-09T16:15:06.900000 -CVE-2015-2419,0,0,31981d98ad117304920a81e92601242bcf97dd7d0866a19f869f14556956b237,2018-10-12T22:09:26.497000 +CVE-2015-2419,0,1,4370a7cf92d2f2485f80491cf6456fcbb6541360f1474f33a24a0e3c8c83f5ca,2024-07-09T18:24:22.617000 CVE-2015-2420,0,0,c509dcfe48a52a338008952c31dc5120935116ebab6014b4e9463e7a906607b8,2018-11-20T20:30:30.113000 CVE-2015-2421,0,0,786eaa966f7aa6a191477cd0dac151e3ed4eaedd287a45399329b44e03872a2f,2018-10-12T22:09:26.950000 CVE-2015-2422,0,0,7f71a818ff1d6071b4122e7049a8c1c10c5bb5fa94a75f6e9af34da9fa00337b,2018-10-12T22:09:27.217000 @@ -82250,7 +82250,7 @@ CVE-2016-0036,0,0,9646286a909a5c863f95c0bb389ed37dcfdee12c3dbcf06c9b35f35ac69fe8 CVE-2016-0037,0,0,4ea6ef1490c7d221c4878fe1468fc1b891018106e8b15f1d9f9b99ba400dccf6,2019-05-08T22:03:15.720000 CVE-2016-0038,0,0,742fe50494c8271e4f0f61dc31ac5732246b40447d98b97031609a4288ff9e7f,2019-05-15T15:08:31.960000 CVE-2016-0039,0,0,8af8c7f06e93f7740f6bf99e99ea8e8c104484cf5c4000d56dfc60dc99d78b08,2018-10-12T22:10:49.923000 -CVE-2016-0040,0,0,8cc50ae82dfcc44dd242fd46f377f69b688272dd499211419ee6271f3e9fc1d7,2018-10-12T22:10:50.127000 +CVE-2016-0040,0,1,e78d16df23832c77e480fb022998c65f66443118bede2ee920816f9bfc62b691,2024-07-09T18:21:38.900000 CVE-2016-0041,0,0,d12171adf318fc8edd8f98ba531865de504a39f9df4032c6fb0c033ec696e153,2018-10-12T22:10:50.393000 CVE-2016-0042,0,0,47936a820c5f25957aea8eab07d40ec4d582ef9415079815cc1b0dcd00b71530,2018-10-12T22:10:50.970000 CVE-2016-0043,0,0,d250b028097bdc676d1801208dd0788d1eb2754d73118fe43dce854af61c8855,2023-11-07T02:29:01.650000 @@ -82361,7 +82361,7 @@ CVE-2016-0147,0,0,04715f2137dc40bdea68761247608ac74512bc1a629d11e5d981ddda906dbb CVE-2016-0148,0,0,dcdbfd69e55cb735648a69a68740d00db9e197194a78c8b14e03f8d65e8902f8,2018-10-12T22:11:18.707000 CVE-2016-0149,0,0,ae1dd4ecf663babeadfc70219f0cb7c41c6da541fe3e3849a602fa85b2dd4bfc,2018-10-12T22:11:19.270000 CVE-2016-0150,0,0,33cdcd9b598673f9ef25f84193eb7c65da7e8bc6c8d87a6ccf4dbc478833014f,2018-10-12T22:11:19.537000 -CVE-2016-0151,0,0,c8bfe8f31f1e3c9238354360df047e7b2c2377cd81658bfd26117b2ab023b982,2018-10-12T22:11:19.723000 +CVE-2016-0151,0,1,2bf24a1e37e28fdb76e7ef7cb27de58b45aa18f9675dc57780330fb810f66f07,2024-07-09T18:25:19.620000 CVE-2016-0152,0,0,bf586ca7e48b9d189641df86441bf0e91975909ee0d5ff81638a49d4919cc9f4,2018-10-12T22:11:19.987000 CVE-2016-0153,0,0,3406080a05cc8d8d35ed152fe3b6aa9c25f388b46c97e2b2483894e36e0267f7,2018-10-12T22:11:20.253000 CVE-2016-0154,0,0,e2e8b415ccf55fb2505e7ac192376aac01b097cdcae6e5aa3d4a14f5a8af1bdc,2018-10-12T22:11:20.457000 @@ -82399,7 +82399,7 @@ CVE-2016-0185,0,0,e98a4739615384bfe61044954739228caef5096d4dd549f81bfbedcf40b087 CVE-2016-0186,0,0,11d722ba25743cbe66ae4d775c905b675c0a83838da797159aede87c5ffaddf0,2018-10-12T22:11:29.473000 CVE-2016-0187,0,0,93b9bf60d4cb7b4fff5464a6e63492915711e6e637cc81b8a627f599d35f7dfd,2018-10-12T22:11:29.863000 CVE-2016-0188,0,0,512cad23b8c04fd78c527343a0a469ed1bf67d54507cc48d25de9ca813014cec,2018-10-12T22:11:30.303000 -CVE-2016-0189,0,0,189ee7c2d965e5479e99ff6d66b90d615e02a03aec6d44a14ba9e922fdaead64,2018-10-12T22:11:30.600000 +CVE-2016-0189,0,1,9d6e9dbf9a7043db06badbc2b1b9b1d56147f9c357505dd55be674061ac1516d,2024-07-09T18:25:02.227000 CVE-2016-0190,0,0,a9a349d795fa483f7797f1b27aac58d98e70595f3bee944b0cbb6200564976dd,2018-10-12T22:11:31.177000 CVE-2016-0191,0,0,d8048c281e217eef10f99071368720e686199969425b77c596c02243e3979e91,2018-10-12T22:11:31.443000 CVE-2016-0192,0,0,3f4ac27a89a425c08b895c86c10c06585c9ef286c9c8647a9fc133d7ff13be24,2018-10-12T22:11:31.787000 @@ -90146,8 +90146,8 @@ CVE-2016-7196,0,0,8383f04cdbbd0d56d5b6d3a3b45438b6137c17373f137c9f4b9fe581220e93 CVE-2016-7197,0,0,9ebec97ff793ee965cabff1fecb013bbfbcab089b10539774f02fcbff26230ed,2023-11-07T02:34:17.627000 CVE-2016-7198,0,0,9fb8b79392e17542e6a584e1db543968bb8fd9e48c2e306bca8419d8dad1a57d,2018-10-12T22:14:08.327000 CVE-2016-7199,0,0,6c67a4cd0278229d7c51dea19daa4ca295dfdc862f88732c4985539e19800249,2018-10-12T22:14:08.733000 -CVE-2016-7200,0,0,bd94c554a3c8ae43f59ea789fa61cf078d020877ae68dba4bc2df1ee3edeb39b,2018-10-12T22:14:09.140000 -CVE-2016-7201,0,0,0ab365100fe276fcf374c33442e53e3bd50e76ded933ef7400621b4456bab3c7,2018-10-12T22:14:09.703000 +CVE-2016-7200,0,1,1fe3fbdd1ec797641502378b3eaf48c8f7139014f83f1df1e7d0300eb1d1895e,2024-07-09T18:21:29.017000 +CVE-2016-7201,0,1,8552b9d243738fdf8780f7961305110a0de3ed19819d0eaab061e8bfb4768bf6,2024-07-09T18:21:10.773000 CVE-2016-7202,0,0,63a911c4f56e01f5a54739a99282781f438ca0444b89e5778314ccc4feb493ce,2018-10-12T22:14:10.250000 CVE-2016-7203,0,0,26d9c2aa25cfd066d239608f6eaa2ac52031689c72ff17210f02ae5e7c6403bd,2018-10-12T22:14:10.873000 CVE-2016-7204,0,0,411b57d09a34d385be71656993d9db737224987ef525248bf266085ce872a226,2018-10-12T22:14:11.203000 @@ -92898,7 +92898,7 @@ CVE-2017-0144,0,0,9a8566e28493c1ffc1bacb8f62bad9216877eea2217ce754cca43ef951642e CVE-2017-0145,0,0,fc55d0ae637a9c436246198aa2fcbf92181270c5707b72947dc0adddefba3ca6,2018-06-21T01:29:00.510000 CVE-2017-0146,0,0,17d7b18ee458c4f4e51bf8d3243c9848e448549d11ac00b885aef372c8177a58,2018-06-21T01:29:00.573000 CVE-2017-0147,0,0,4738fa144a446610dad559a1e7d5f72a7c987059e1c24dd15784753810fa03d6,2024-07-02T13:00:45.673000 -CVE-2017-0148,0,0,02b1678c9d02170cc69ac6bd87c20ffb850bae6f76faa5c9836a2073cdc4656e,2018-06-21T01:29:00.730000 +CVE-2017-0148,0,1,e2fd4ac9088f29b3fabbde64258da1d22d8efef8c7b25bad3942f26e1aba9d1f,2024-07-09T18:28:14.240000 CVE-2017-0149,0,0,d0fc977eed39177e167fadc668df40e7876af7c24b417f226d9ebe027eeecf08,2024-07-02T13:00:58.010000 CVE-2017-0150,0,0,e21791e4ee63dfb54124059a85a06324b6b61362d62e2802f612ccf4d4b49bce,2017-07-12T01:29:07.987000 CVE-2017-0151,0,0,a4b35ecf8e6d0aba2a3d537c6764d048d445233e302757af7de70eaf3fab5c1c,2017-07-12T01:29:08.050000 @@ -92955,7 +92955,7 @@ CVE-2017-0208,0,0,887be73202713e9662af04de1d0be719b307e98c96e2158bb681b120992cde CVE-2017-0210,0,0,2863a170a0c9f19874b01fac0a8314fe088f6681c49bf5d8f2495b96f599ea0a,2024-07-02T13:01:17.803000 CVE-2017-0211,0,0,9d58cbb2f74fcbcb41706a1af142f181126371a1382a0fb961f25fbc1985130a,2019-10-03T00:03:26.223000 CVE-2017-0212,0,0,94393a643ed1f02c861bbf12ee64ca980735a1e76404b671067a2f9a30fc9605,2019-10-03T00:03:26.223000 -CVE-2017-0213,0,0,3ad1144d439d19feb1aad07d5586d2a305dcf2848c5337a419b0356706578c88,2019-10-03T00:03:26.223000 +CVE-2017-0213,0,1,6ae49e16ae59f466fac64f61dbb37c8e66e7cd0a26af5cada630a9b398110add,2024-07-09T18:24:42.860000 CVE-2017-0214,0,0,51e89fe513d3f14f614130ecf9931d3164090bc1f7ddd4a47e222f2acc250bc4,2019-10-03T00:03:26.223000 CVE-2017-0215,0,0,2686abd9834b5097e54d01d1baeb2258ae37f3890c2db53edab47f4a098061af,2019-10-03T00:03:26.223000 CVE-2017-0216,0,0,4c801db840a003da421224091f4e26e240806ad7c6a170edb63c998f977e9577,2019-10-03T00:03:26.223000 @@ -121382,7 +121382,7 @@ CVE-2018-25098,0,0,49cc91eb8b166c87ee873e9d859cdae56021ef44482375cea406308fd3920 CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000 CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000 CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000 -CVE-2018-25103,0,1,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000 +CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000 CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000 @@ -167769,7 +167769,7 @@ CVE-2021-21548,0,0,5940fef6a94cff46807132d688eee90275aa0af6cbe03176bf808730f976d CVE-2021-21549,0,0,b5b66514a2bd8c434261444929ca20f95cfdf704920e6938dea19274880deae2,2021-05-28T11:55:46.223000 CVE-2021-2155,0,0,7acce614d47c604458ea4b8bb22f065156486c8d240958ff7180b81918f9851b,2021-04-23T22:34:14.980000 CVE-2021-21550,0,0,4332bb0246311b27f2c678d3e6e288e73bafbd995138d22e8e188798fb715aa6,2021-05-14T15:56:14.163000 -CVE-2021-21551,0,0,b881b22b7c6ae629060756c39bb6787d23e764d4b2fbe2fef21c2f065413a32f,2023-10-05T06:15:09.290000 +CVE-2021-21551,0,1,3b139e7e08f0d45d76a1d75a2fdea1709ebb722f821de10f66925a1590a02a8e,2024-07-09T18:27:32.497000 CVE-2021-21552,0,0,b328a805c1a6b67fbf82e79486da2ec6df2b485a3fd263d2a92873d406a5ac54,2022-04-26T16:05:22.883000 CVE-2021-21553,0,0,a97fcbf70d2b00342e3ade500294455424813ba7687bf834164e92a98f0195c9,2021-08-11T18:23:06.913000 CVE-2021-21554,0,0,5e551f507660a71b6bd69fa978368ec37278f7f0fbac8c9f69f735eee724698d,2022-10-25T23:43:25.277000 @@ -175189,7 +175189,7 @@ CVE-2021-31160,0,0,75457ea0ee19c984122899e6c34bac30a82d98b0ea12d943f4ef353941105 CVE-2021-31162,0,0,c6dfc8a3c2a3bbbe52f42a07b03c11ab96a42534f46673ff83668a5aee482fcf,2023-11-07T03:34:54.560000 CVE-2021-31164,0,0,43500ffcb450246853b98ded76508d4cde0698cd9b4665182b1d589402ca35d7,2022-10-25T19:14:57.207000 CVE-2021-31165,0,0,2a8628f02b56d3b4c8524a7f090858bb4e4ed12d117e9a9551f21a033c05ebd9,2023-08-02T00:15:11.880000 -CVE-2021-31166,0,0,92b339fdef21b715e57546d69f4138e68475f62a95e56626978351205a052880,2023-08-02T00:15:11.973000 +CVE-2021-31166,0,1,6b9ebe34215afa6b0c7df3a14e55c0589e97bf4a4e71f8e1dc063d13bd3ecf34,2024-07-09T18:28:03.397000 CVE-2021-31167,0,0,897901e36a2c6e5a83cf7668cc8f4681818fb83f6d85bfc4a5451ca930cbc3b4,2023-08-02T00:15:12.070000 CVE-2021-31168,0,0,9e60a9bf20fdd35b93c2985fa9de4591b68b172a01deacd629355366ebfde90e,2023-08-02T00:15:12.160000 CVE-2021-31169,0,0,ec7ac0ee2c141f4404b22b98e9efe49e9cfd37099c42df5e1bbbd8df035f5b30,2023-08-02T00:15:12.263000 @@ -175512,7 +175512,7 @@ CVE-2021-31555,0,0,17a03e2c12e464cd3eabc1e651185b8119076ddc1b5594779e4c2702e1870 CVE-2021-31556,0,0,c8d7112c6a7ed603acf345a0affdd4b4ac984eb83a57b9258f1cd62116bbcf75,2023-11-07T03:34:58.647000 CVE-2021-31558,0,0,d6b7eca8b3661e1164cde3cafef1c266e2f8472859f6d02c98f0ee8c033dc5fd,2021-12-28T14:54:32.527000 CVE-2021-31559,0,0,960ef105b3161c8de185bc6fc58d26fca8236596b08b91f433c81abecf743c41,2022-10-25T16:42:38.307000 -CVE-2021-3156,0,0,d96420e86b4f56277719e9a9912c29b0ab5e8fecb7fd16b23467eace207238f5,2024-02-04T09:15:08.010000 +CVE-2021-3156,0,1,806c2a3a0ff7fe53659d566e9bdf18f925a9ebcb66e6a0ff40da7c6bfa4c4f40,2024-07-09T18:27:53.967000 CVE-2021-31562,0,0,3986101c0e7c2d25d5c1ce24878f729b44f76964b4bcd7fa68f648e6fb2648fe,2022-01-28T15:55:53.923000 CVE-2021-31566,0,0,dedfe936a71d1cb49427f525b78a1ffe3c1db3d3b573090e9852f36f955495d2,2024-03-27T16:04:30.260000 CVE-2021-31567,0,0,bca43f0db30fc722ddd2e9bd8fed1b110a7669196d896ae913f81e804a6662ff,2022-02-03T17:09:44.553000 @@ -177623,7 +177623,7 @@ CVE-2021-3448,0,0,50224d2803b58888c3341f9d0929a14cebc1ace114c4faf68810c9537f4fcc CVE-2021-34480,0,0,2dba25ac526a9818985922ef3a503f39ed8b2afe5146c0a4fce30e84b33da48a,2023-12-28T20:15:48.087000 CVE-2021-34481,0,0,cc45642fc7a397c0c2a980c102a00c81ae427459d654d20567e410afa2debb40,2023-12-28T23:15:33.573000 CVE-2021-34483,0,0,926834a6ff3de5c65d758300dfa8610dba2a29eebc777c4d076c562eb98e8951,2023-12-28T20:15:48.283000 -CVE-2021-34484,0,0,fb9153d4db95c8f02df4575765f46b801127bfd529ec3c487f0241c405476d31,2023-12-28T20:15:48.487000 +CVE-2021-34484,0,1,5f9ff3c50f353312e2afcb1583cc3d7f2572bca876f342e2f13bffbfaac8bf79,2024-07-09T18:27:20.330000 CVE-2021-34485,0,0,221c268fe0368805b49348c35a9aa26e44ef14add4ae735e060611d3cc74cdc6,2023-12-28T20:15:48.690000 CVE-2021-34486,0,0,26750b42c6677e4d438123335e851896c78c7bfd50efd913f9d0d3eaeae78fa6,2023-12-28T20:15:48.893000 CVE-2021-34487,0,0,60bc6eafbe48e1e0808f1dd78bc9b0825d2511660cefe050bd22c65a426db637,2023-12-28T20:15:49.100000 @@ -183611,7 +183611,7 @@ CVE-2021-42283,0,0,16912d7c3817b9f0957877defa9f0d352b181418b4c17369178cd0997568a CVE-2021-42284,0,0,629f40097e9565953edb7aba354597bb9243f6cf8792d4f573eda25ef7531bc2,2023-12-28T16:15:56.230000 CVE-2021-42285,0,0,df92dc4c458e022b71b9ec0af309bd5362711079b05767cc7131a37fddaa1d57,2023-12-28T16:15:56.430000 CVE-2021-42286,0,0,e0bdf09be9d8a4f37891b5b8a3a1f9384023e5f135da048dbe3e767758759b22,2023-12-28T16:15:56.650000 -CVE-2021-42287,0,0,4530bf49b10f19f0f3f16792f1db1ef4abf11b13ebccda9aafb4b60999d3b5c6,2023-12-28T16:15:56.857000 +CVE-2021-42287,0,1,1c7eddd27011068f431f066ff4735b4c7089b91bfa275dc0fd9e2bb24e670b4d,2024-07-09T18:28:30.367000 CVE-2021-42288,0,0,bbc3076fca8b6770f7bcc3200f789bfb65b14052c8e35102426fd346aaf98f61,2023-12-28T16:15:57.040000 CVE-2021-4229,0,0,6a1705ea112c357ab7c7315291b244bd204fed72223af738e6d58bd627e0ca20,2022-06-06T14:23:42.200000 CVE-2021-42291,0,0,b7a3e4a850d1176a2bfe998b3695733e15940d4ade9bf16f10c870594b3bb0ae,2023-12-28T16:15:57.257000 @@ -187205,7 +187205,7 @@ CVE-2021-47385,0,0,07eaed946a2a9d232c10ed4b0efe6bdf93e4f06b333db4eb289bd51a15464 CVE-2021-47386,0,0,44f1997d9cfeae54f6351b256ca991e2a6811de804a0722fee92cf555cdcddd4,2024-05-21T16:54:26.047000 CVE-2021-47387,0,0,6677a3ada1b90e26c087f5398695729cd49832bb12507b95bd0abd8cbe36f0c1,2024-05-21T16:54:26.047000 CVE-2021-47388,0,0,a2597a8082e6e7cfdc0a6885efcb2572358e29c5f700e35d61444e39d998c2f4,2024-05-21T16:54:26.047000 -CVE-2021-47389,0,1,588e7655e8bb0cfd79faf3f5cbcc5631a2de28688d6c14ffb98ab5286b5b6fa2,2024-07-09T16:22:03.467000 +CVE-2021-47389,0,0,588e7655e8bb0cfd79faf3f5cbcc5631a2de28688d6c14ffb98ab5286b5b6fa2,2024-07-09T16:22:03.467000 CVE-2021-47390,0,0,03c3564822ed1b7d876d50188b9c1ed1fb70ad73fcfdf2688c04d92b1ab95e21,2024-05-21T16:54:26.047000 CVE-2021-47391,0,0,cdc33f7c82603c94f36855422da7ddc848f1baeb16de5abf5385d9e35324c0a3,2024-05-21T16:54:26.047000 CVE-2021-47392,0,0,bb0e9ce9c96c156603b802686e332e3fc41735c81d7e887d2a01c5f3adef3945,2024-05-21T16:54:26.047000 @@ -209715,7 +209715,7 @@ CVE-2022-45143,0,0,777bb81ae300c6b131d3f961bbf0faef6b540234c3507ecd6488db3c79ddf CVE-2022-45144,0,0,425fe3b4182cc0063506bf465be4e6d5803ad55495aacb759ec8b5c5476bc412,2023-05-25T18:56:40.823000 CVE-2022-45145,0,0,d8529b6bc9003139657f884f540f40621760d3d4a7513023f2c773eeb0056927,2023-11-07T03:54:37.230000 CVE-2022-45146,0,0,9b4f4c29b96d0115ac09d614dffc2ea1879eef65d2400204c0c360c964466093,2024-02-13T19:15:08.393000 -CVE-2022-45147,0,0,6400829f27c1be66d9a15e47563ead744ceb38554d2a5f5f69b042bc721b9608,2024-07-09T12:15:08.830000 +CVE-2022-45147,0,1,d7be45f6d7ee347fc0ae047ead0dd9d3437406c0337377842c58ba1119cbfa81,2024-07-09T18:19:14.047000 CVE-2022-45148,0,0,f5a03ded6b62544581c57ff5a9affc26b93fa7d80bcf4c04a81b2ee78fec6928,2023-11-07T03:54:37.337000 CVE-2022-45149,0,0,3d161f357d17157c4f979a8184f96109bec0817f4180c316b3f6f1fab9386295,2023-11-07T03:54:37.710000 CVE-2022-4515,0,0,b955d02467e6479ac5fdc7c4b6fe4c2a6a5e7d025a2fbfaf247666b69eeec87c,2023-01-03T17:22:43.047000 @@ -224400,8 +224400,8 @@ CVE-2023-3273,0,0,beda35b629cd5a8dc3322ffd0e258687d15e4f0486dde1db806ca07763d5de CVE-2023-32731,0,0,55cc86a06d1e33695a40aafeb941edb073e721533067860a1e0808e9aac3b16a,2023-06-15T22:18:49.193000 CVE-2023-32732,0,0,46437dd13d86aabfe5f9ac455dc47b579ce8b382950a74de9cec0543ff2be51c,2023-08-02T16:43:16.320000 CVE-2023-32734,0,0,c76f50d0464850d8ceda9e98bc0abe48474ec59c89cdd82225edfc0c8c82f193,2023-08-03T17:03:51.680000 -CVE-2023-32735,0,0,c0a50a2f00d3e6c3d63bc7c19f484328899bbb0a284bcbcff4cc5c59c522b9dd,2024-07-09T12:15:09.347000 -CVE-2023-32737,0,0,16cdb5767843a9cfd55605d7c18ffc39a80c5194d248e26cd73a3f1caff05559,2024-07-09T12:15:09.627000 +CVE-2023-32735,0,1,f64199245959d56e8a418d742aad8200bdd2718cff3aa1f92e204541881d5488,2024-07-09T18:19:14.047000 +CVE-2023-32737,0,1,748ef9db59f23d0c6ff3c0050311c40d105fc691ccf23e6f1c0a9033303d0a41,2024-07-09T18:19:14.047000 CVE-2023-32738,0,0,3569f99f2ea77045af2dbdc692784f1fc684df5d630c17deec2488e687a2e34f,2023-11-07T15:07:59.987000 CVE-2023-32739,0,0,1a418d2085d999ee92166902e1f2e1251a655573d71eddc84cfb5578de76aff6,2023-11-15T18:53:54.840000 CVE-2023-3274,0,0,816f3a72806cb3d098efc4eb28a56b1da6edc5d10385dc522fb1470a08504f51,2024-05-17T02:27:24.103000 @@ -224504,7 +224504,7 @@ CVE-2023-32846,0,0,ea9c3d72ce77c30622dde95f8080fb28d7691d353a40ba3d644100eff14af CVE-2023-32847,0,0,0bfce3dd564cad45600142284599c46a5021081abccc164e0fdb0c9a383366c6,2023-12-07T16:36:52.073000 CVE-2023-32848,0,0,d7f5e130130ec6dc114b35418fdbced59e6e190f774064e5eab08e9979e5b40e,2023-12-07T16:36:59.973000 CVE-2023-32849,0,0,979e777a68b9b88efc014b3814ae295d8f3e1e51075d766807166d268e3d1d8b,2023-12-07T16:36:40.697000 -CVE-2023-3285,0,0,5a23d95f558a3c30d8efa361684c504bbc4ad29b651e566a51c799ce77da8578,2024-07-09T10:15:02.380000 +CVE-2023-3285,0,1,b10839eb1587ab4bfab3e580b1fa67ec9257eadb4d8bb458a1bb07bfd4b96da2,2024-07-09T18:19:14.047000 CVE-2023-32850,0,0,e8738332c16e92e016fddcbf973597699f8e8a1a5c43d7d2ac0361fea13e8bf6,2023-12-07T16:36:32.290000 CVE-2023-32851,0,0,4c9a9ed85a60de891aecdfa5764102e0576ebc1408fa82a9edef14b726f710dc,2023-12-07T16:36:21.827000 CVE-2023-32852,0,0,3323be0e7470b99c175e404ca47d5ca7f78813bbf3f6a16b537706a196549466,2023-12-07T16:17:03.240000 @@ -224515,7 +224515,7 @@ CVE-2023-32856,0,0,fca9a8aeb7286ed861302ddbe5e56c0d0fe174250194aed77197e02abfe0e CVE-2023-32857,0,0,9ad954c0b3cdc377ca5fa1b727488706b0881e616cdd0b1d89a02c86d386fa40,2023-12-07T17:36:29.340000 CVE-2023-32858,0,0,734119a9c81f46173ce61749e113f6ec984ec6727552c658d37a4cf583fc589b,2023-12-07T17:36:19.570000 CVE-2023-32859,0,0,61b0f7aebfd8602f76a67ebc2edc67c04afc37db1e58d4d0343fffdd1348f3b5,2023-12-07T17:36:06.697000 -CVE-2023-3286,0,0,3056631470d45c3f612b06f4f491cf5b2d522d07c881172c19df164670272180,2024-07-09T11:15:12.207000 +CVE-2023-3286,0,1,9bb212f6c921ca2d585746c18632edc2006b63063d5c7d9f94cee66994ff0b7a,2024-07-09T18:19:14.047000 CVE-2023-32860,0,0,9472cc200c5af9ac744ea7a979f926c98747261996bcda7cfc345fdcaf86aaf8,2023-12-07T17:35:59.067000 CVE-2023-32861,0,0,519ff13f4b5325a092ab459595ff3fb6f885604b7f22b1d8c03314b2646feb39,2023-12-07T17:35:51.410000 CVE-2023-32862,0,0,0d38cf7bbb4d8b7a4a2bf62466becb8cd440e385b36172e84709a64314de2a08,2023-12-07T17:35:38.167000 @@ -224526,7 +224526,7 @@ CVE-2023-32866,0,0,f28e35f43076ecb6475dbfb16f7561abe06f03d8d2a430a501ec5c92a2e22 CVE-2023-32867,0,0,7405f13eac7f439d495a55e0c0ad6496b886a13ff75c507fecbdcd39b46b9182,2023-12-07T17:58:45.040000 CVE-2023-32868,0,0,514fd172114077d7fbccaed97fc6516ae108d5df384055a9a616255aeb3eec35,2023-12-07T17:58:17.833000 CVE-2023-32869,0,0,5d4b1db0a3cca6e6a3c1d722187e9f0fe0ffa050cb843037ff26b343241bb682,2023-12-07T17:57:51.860000 -CVE-2023-3287,0,0,b8e953d00d548a772f44392694e44dd4c1a8ff8b40a31b7f8a2a6b9baea784fd,2024-07-09T11:15:12.397000 +CVE-2023-3287,0,1,9e9d3ee1f19118a8e06d13a8f93e9272e290d1452a43d6aff3594f36fb5ea097,2024-07-09T18:19:14.047000 CVE-2023-32870,0,0,6f654473f7802507e7152ddaf8f2fbe53e09fa9504c836cadd72f989d7757638,2023-12-07T17:57:16.337000 CVE-2023-32871,0,0,1997ca9337177dccdf6427ee8cf70d73b1562b274175da620a0655d19b16f066,2024-05-06T12:44:56.377000 CVE-2023-32872,0,0,e9d307d9999e4f102950b167f2760b92fc91db21d3383a460efd9f2da1559366,2024-01-05T12:11:25.160000 @@ -224537,7 +224537,7 @@ CVE-2023-32876,0,0,6c98e96b7897627ca3107e0b99a9a1a4f48b7a1e1569317ba2352b0bd7b2f CVE-2023-32877,0,0,1996335e32f77a53db64b621c118a2459f5fc5340515cc0742198ef1e16ff716,2024-01-05T12:12:08.767000 CVE-2023-32878,0,0,12c2a549f158383567580208905baab7124ff46587da1e74b1fd54d8542dde5f,2024-01-05T12:12:17.683000 CVE-2023-32879,0,0,050f7d0fc811b689af1d2ff81447008bb1f856bf77bd2365a207e1b5fcd6bee1,2024-01-05T12:12:25.457000 -CVE-2023-3288,0,0,d23389c5e8a6dbd2840adf2e57195e4caa343503b7c5246abce882e0d05b58c7,2024-07-09T11:15:12.600000 +CVE-2023-3288,0,1,cd1ecf53b7b578eaee7f148a6abe9bd48391bee1f97ec0d46c42ce91ab3e026a,2024-07-09T18:19:14.047000 CVE-2023-32880,0,0,ec62599cd190fa5631c1db51284ec5fc884b9fc914b95ef1cf7376083c908bc8,2024-01-05T12:12:35.443000 CVE-2023-32881,0,0,a4704030c7d032d5677e27b5f1098d503f7d97f042e949e4536d0936fbf42fcc,2024-01-05T12:12:45.207000 CVE-2023-32882,0,0,df1fa193037e4337618cd111772a27b1513360baec7388ea55a5ae1faa96286a,2024-01-05T12:12:51.510000 @@ -224548,10 +224548,10 @@ CVE-2023-32886,0,0,a1e0e6e35a82474801d01fee00ed7b713b76cb490c9e009a01e021dd350dc CVE-2023-32887,0,0,48abfa29f65ba36268ecb2732df23027db92d23ebae32c0977ef469c44d687f7,2024-01-05T12:13:33.227000 CVE-2023-32888,0,0,bedec17a23698ccdadb336abf8b29d54162af8ad914a562ab7359fcf8148445a,2024-01-05T12:13:38.553000 CVE-2023-32889,0,0,7cb67259e9340438e5c911944c46393c49874c183ab4a4642ae61b61abc60ead,2024-01-05T12:13:41.860000 -CVE-2023-3289,0,0,740f0af15aa323998ac82e14d13d45b6b9aab6e9300fa210dd96edff447e4dbe,2024-07-09T11:15:12.787000 +CVE-2023-3289,0,1,c841db633a4c0617c1ce8643595eef1c8fe782d9b15a76ebb59f1a2a99523a06,2024-07-09T18:19:14.047000 CVE-2023-32890,0,0,eb304c24f18daac453bd54f93398acdc8265ac647e9c71261cf092befb74da5d,2024-07-03T01:40:05.030000 CVE-2023-32891,0,0,09eecc819ceaf3608a4419e7e5b09cb8d1608302b5880d0698c2eca4637b514e,2024-01-05T12:13:46.007000 -CVE-2023-3290,0,0,54fcb6494ab278e7d4011bf52b5bfeb1e7cfd38895ee0dffc65f9d0b4ee214ae,2024-07-09T11:15:12.987000 +CVE-2023-3290,0,1,c1b22665dbe4f60b94bec55dce7d123c73e7ee0bea76e1902e9f35c040b1965d,2024-07-09T18:19:14.047000 CVE-2023-3291,0,0,50ba92d440169e058cabf8272524addfce3b26587de2ca01da6efdc860fd0a1f,2023-07-15T04:15:12.797000 CVE-2023-3292,0,0,3bc36b7adaaa0f48e8f0a081da821bfcf4bfcb185d07c41948cb64a3f47d3581,2023-11-07T04:18:24.753000 CVE-2023-3293,0,0,b5c40a25272e39bfc48ab91d446fdf8350024f9f56dac90b381582e0b752d8d1,2023-06-22T21:30:35.250000 @@ -228230,16 +228230,16 @@ CVE-2023-38043,0,0,ddff95dc84d5474f013af01b45f2fea839bdff1a00b460948921745cd9483 CVE-2023-38044,0,0,5beacf7f100d92fa14b8932837b2d0d55c41ff0a223a951f0943e0c0a0a6001d,2023-08-09T17:51:49.967000 CVE-2023-38045,0,0,3913939a5a0e5f3900ee3567494b99f1952a15509319eeff3e5069f87b759c75,2023-08-09T17:51:59.253000 CVE-2023-38046,0,0,9a25f2245c0111b3c1a6dc246527e6e8db824481c0739b236df21aa7c2c709a9,2023-07-20T17:24:37.857000 -CVE-2023-38047,0,0,75bebc3260a4c65460a806f552934f617b9c33da209e79e29be5f8a10c1a454f,2024-07-09T11:15:10.333000 -CVE-2023-38048,0,0,3f3b30557c2d9beabaf0f1712a4102457f5039a34109421f9439c7e86f3fc82f,2024-07-09T11:15:10.600000 -CVE-2023-38049,0,0,928866bc774ef57e4e20c7e5f101d4d7c8feb9fef63b29094a6063de5d778c07,2024-07-09T11:15:10.820000 +CVE-2023-38047,0,1,12ec28aff01a83ed3012d75b5118e5271cb36fb731f503f0ccfdb744547ae319,2024-07-09T18:19:14.047000 +CVE-2023-38048,0,1,7791d08d4c607d97febb50fa21a246fe96b61c3cb3f8e44588518367007b867e,2024-07-09T18:19:14.047000 +CVE-2023-38049,0,1,ef7cd9c31de0b5660b98f5a77303fa1afc48c6fddfbfe712d5ea12bd483993e5,2024-07-09T18:19:14.047000 CVE-2023-3805,0,0,4027ed510e112d9de79d1cb68718bc4c7fa6e718ae365c714d17b21c47ba9416,2024-05-17T02:27:49.667000 -CVE-2023-38050,0,0,7f268a08aed63634f708faf934565cbe6592a49080af917f1d3142d9fe738fcd,2024-07-09T11:15:11.017000 -CVE-2023-38051,0,0,37a8b7d04e870b58edff68797de30061750574928deea55f54d65696ab14f2b9,2024-07-09T11:15:11.217000 -CVE-2023-38052,0,0,9d23c9880d34483e20143b282b76987c04491c9a51b3fe29ea5bea1b6734c97f,2024-07-09T11:15:11.413000 -CVE-2023-38053,0,0,598a24cddeb97fc82587b675e45ae3165c0501b2f364892abc91c8807acdfd74,2024-07-09T11:15:11.617000 -CVE-2023-38054,0,0,18a1e94392079ce0adc01ca7be1d7e11c68b71b5a67bc44cd0d0e38d7c78fae0,2024-07-09T11:15:11.820000 -CVE-2023-38055,0,0,500e6419e2daf8c6bbfd858f3a6eeb4fa58b649c68060d00e818231cc1735445,2024-07-09T11:15:12.013000 +CVE-2023-38050,0,1,c661e3cb3188cc508d70dd0d256ff80cf7c62ad0f61a4054991bbd34a0a918d8,2024-07-09T18:19:14.047000 +CVE-2023-38051,0,1,8c43bfd4eaa72041ea0d68811a0784f26a3fe2f71f609df4d8b9d8b68bd5a752,2024-07-09T18:19:14.047000 +CVE-2023-38052,0,1,332d4604a0afa95e4640ea8753e361b91177d186556e9819b0b440332d152144,2024-07-09T18:19:14.047000 +CVE-2023-38053,0,1,85b382f8b1eb573ff928c17ee58f5027d476b098410f6966c8d1a839949d927e,2024-07-09T18:19:14.047000 +CVE-2023-38054,0,1,ce0b9e918c3c8b7495583ccfd9730122f4dfa24b6e0cd1044fb5aac4606f00c8,2024-07-09T18:19:14.047000 +CVE-2023-38055,0,1,698abcf59434dbb6415ae166fb7dc27580bfdaf5434c4c468b4c403f1d9ea1b4,2024-07-09T18:19:14.047000 CVE-2023-38056,0,0,5128d7ef7d21b48ffe036243e9997a98087914324763a521d9d98099dfd593f3,2023-08-01T17:00:31.543000 CVE-2023-38057,0,0,a02ca8235630b193af228248b46925cf905445bffb3680f54a73aecbeb0f9e44,2023-08-04T18:48:27.357000 CVE-2023-38058,0,0,17b3b5acf5ebaa3f6d104a9e1064b71e88b9e50fd4992f3f87b48fea888e417f,2023-08-01T17:35:53.147000 @@ -228925,7 +228925,7 @@ CVE-2023-3881,0,0,fa5b199e78d8db8e0d6d0feb84d0cae852fa3ba49d7f983fec918a5d94da37 CVE-2023-38812,0,0,d181c0a16a4a3e91ce369617b782f9fb138bdbaa66c8aeb7f491f2df4b0ac91d,2023-11-07T04:17:24.480000 CVE-2023-38814,0,0,520cd7b10c855389a1bc7ddb6a5bb7e8663bdef466c5db4ce438ddcf6bc753df,2023-11-07T04:17:24.517000 CVE-2023-38815,0,0,468a2ea52ab8d33f4eed093b442833e9d36416e7f294c8a6c926f4142bfc85c8,2023-11-07T04:17:24.550000 -CVE-2023-38817,0,0,b3d9f578312e911728b799905ac06cdee5f42947511af7f56f77c2d8845f9ca2,2024-05-17T02:26:42.437000 +CVE-2023-38817,0,1,02f08d8764e58ddff92f8e71f36696396282f0c973dbc17473db3d1e17ca402b,2024-07-09T18:15:08.577000 CVE-2023-3882,0,0,3903a7f2ed3eff124f4357de66e2e4e6702c4497576c386ce69964452736ab13,2024-05-17T02:27:56.237000 CVE-2023-38823,0,0,1c9d8181a78f309fc93ec1f2fcdb8f25aa4db4dec4a9c87ffd3832b684a07342,2023-11-28T22:02:33.013000 CVE-2023-38825,0,0,90df192bbde0cd689834cf86420b5b8a6ebb4c6751aaf201c78d9a0a1ff44c7d,2024-03-21T12:58:51.093000 @@ -229311,7 +229311,7 @@ CVE-2023-39323,0,0,d2da5a246500965f999a8d84c29008728f75c547f230a13d2193b126917ed CVE-2023-39324,0,0,6ec2f79fc00f25fb9c6c7b8459112c051220341ced94e2f114cadb7ed5dacee0,2024-07-02T17:15:04.737000 CVE-2023-39325,0,0,58abd083daa7fb16a442cdfaef715883a0fb11da9a8652276862d7d26f2ab493,2024-04-28T04:15:09.877000 CVE-2023-39326,0,0,90a833293ecdbd92e4a1c1828cadca50fa959e82465478bc6c6b2b71065dacac,2024-01-20T04:15:07.890000 -CVE-2023-39328,0,0,579d64a21938a69f9899a4bdeea92ab0d9dcbc92c4721e6e21776584805e84c0,2024-07-09T14:15:03.400000 +CVE-2023-39328,0,1,5cd27bf9c6b82a9f2de8b6f4e16a5adae2ea884e954b836f4416e9d86d703d2c,2024-07-09T18:19:14.047000 CVE-2023-3933,0,0,2d784fa3bad269d318314e0780fb5ab15203b6d9670481cab4bae609ef1ad2b5,2023-11-07T04:20:00.337000 CVE-2023-39331,0,0,0b3bb94930c7b603cf2498545fe912acbbb259488d38f9dc6f4da6943004dbbd,2024-06-18T15:09:45.857000 CVE-2023-39332,0,0,8b910ceea29382c3501406376a4083bac4d69f69380af431d3b75bb270bf2e58,2023-11-17T19:08:58.170000 @@ -230101,7 +230101,7 @@ CVE-2023-40352,0,0,48052fda2c5d9a18e428e08ffc8f44bae850ce5ce40b9b7662ef3d10a9b29 CVE-2023-40353,0,0,a6514e8372b057a8897fe57c5e68ede8d409da82bdb893d23987e7b894caf6b8,2023-09-12T00:10:41.327000 CVE-2023-40354,0,0,41467c5a73a3d93ce66c8cd4ccec94a90f6a26142eb984b319f321455ca06ae8,2023-08-22T15:55:45.223000 CVE-2023-40355,0,0,5386b5128f27710a0b9181ddcfaadb01f467f6392271e65d8baeca3ccb3ffd1f,2024-02-14T18:49:39.177000 -CVE-2023-40356,1,1,f318070f2b08be6481f96041b632280c6cde0e6b4b2e17dced7fd0d0272070bb,2024-07-09T16:15:03.067000 +CVE-2023-40356,0,1,510208fdcf1a3f65ed02166e6d84e0d489396c2a1135407da271f94d124be550,2024-07-09T18:18:38.713000 CVE-2023-40357,0,0,e88f64aacd42ff58fc4f935e27c3477515399a92c9ad1a4af9482e3cd07ff78f,2023-09-11T13:42:13.197000 CVE-2023-40359,0,0,a61dff496b4a0b257cfb7ca83dcbb4f0094fb8c979850b29955266c663f5b899,2023-09-07T06:15:07.990000 CVE-2023-4036,0,0,fa17a9a889babe1e80884202d93433c7d7d3c1b5cbd35ad37d2e032154c3bd98,2023-11-07T04:22:04.067000 @@ -230429,7 +230429,7 @@ CVE-2023-40695,0,0,0565dac58c5b405f94a8b0880c3fb91214d43d3dff82221de2610a56fc602 CVE-2023-40696,0,0,87080cb4e6508452ae42e7e7c434ea9377f85ef2ea25a571af4968d0d776c923,2024-05-06T12:44:56.377000 CVE-2023-40699,0,0,0281fd0a2d96e2b3d2e27cff950bae00c56c9972b79b9b6a647313f459d1cb73,2023-12-04T18:33:32.667000 CVE-2023-4070,0,0,9d21085ce468d07f2e91581c9dbb6c9a9c126cbff6d2df14b22eaf2441584fe3,2024-01-31T17:15:13.767000 -CVE-2023-40702,1,1,7c19ac19fe1355395b057c4dc38680580487571a7e14a9fa7cd780cb72136d0a,2024-07-09T16:15:03.220000 +CVE-2023-40702,0,1,c68b3b86b818fb01bfc3da74e0ad03ac34af598c31b754a13d0717b98914e9f3,2024-07-09T18:18:38.713000 CVE-2023-40703,0,0,dfe949889af9affd00ebdd8deec61f2087ff2ff4464457c9c5e703ec1da6c8a9,2023-12-01T19:13:28.487000 CVE-2023-40705,0,0,c547e6275ef5ab0a0bb8b98e24c0b547b91bc323da2680d2194c528063496c27,2023-09-08T18:48:31.770000 CVE-2023-40706,0,0,d0a82fccee914776d0427e6216d7a8dcf31d23029a67f9509f0b7df85bcadd54,2023-08-29T23:34:50.430000 @@ -235483,6 +235483,7 @@ CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000 CVE-2023-48192,0,0,1285879b16abdcafa4a056b0a2ae5a60d7ab03d27d3ea5f474efd527a8dd754e,2023-11-29T18:00:50.257000 CVE-2023-48193,0,0,8f22f6af3b763f3aba623fad3c683ebc180c071d282e0bec208eec47a39f0489,2024-06-11T12:15:13.230000 +CVE-2023-48194,1,1,0c6d42266de4eb7c20a055d02569950d5ec38beaeccc92c11e22fb9c36c05426,2024-07-09T18:18:38.713000 CVE-2023-48197,0,0,31a398840f5127471e0f8ae2cf500de34989ec8d6ef4a8f37794761f9d27492f,2024-01-24T22:15:14.793000 CVE-2023-48198,0,0,6b14067601810d1ec0f8423179bbed0cc917124b62a5a8159de8ad1221e064ad,2023-11-28T21:15:08.420000 CVE-2023-48199,0,0,f91afcad18bf76cb6985296ef753eff7492fd44ba7cdd52526fa9c10ee40f6b8,2023-11-28T21:15:08.477000 @@ -236962,11 +236963,11 @@ CVE-2023-50170,0,0,1933563213fc12fd041d8d7f18f883d0e0fb318fa67f3782d779da0456696 CVE-2023-50172,0,0,8f1e604d0a3446a4842b2c860e54ee234ad85566097adf5e80886653fae238cf,2024-01-18T14:28:59.977000 CVE-2023-50174,0,0,257a353ca8075f466599b6a997c2ba13e17640325aaabe34b5cdb618a3234661,2024-02-14T18:15:46.640000 CVE-2023-50175,0,0,c7250dad12f19a8301b9ce20d4f9bb1dc1cf49efd9cbcc8d021a9bbffc14204e,2024-01-02T19:53:20.863000 -CVE-2023-50178,1,1,1308ef5dfc3f89ca9be810706fb746dcfa42591d829141d52630ce1f1620409f,2024-07-09T16:15:03.390000 -CVE-2023-50179,1,1,454dec1476ed2101675ba3b2b4e496407e3cdf1639ab414a3812d91d5f88bff4,2024-07-09T16:15:03.640000 +CVE-2023-50178,0,1,fabec136f153edbf571fa7923eed0d32ab68376b78910e658ae6128396b2c772,2024-07-09T18:18:38.713000 +CVE-2023-50179,0,1,97fe83b7314d2fbbbab6bcc6baec367ea82fbfa44200dc13d50d557945bf8846,2024-07-09T18:18:38.713000 CVE-2023-5018,0,0,ebfc03c194c380adbe7ba283092d0866deefcaf7b065a9cfd3bf76185610fb9f,2024-05-17T02:32:46.463000 CVE-2023-50180,0,0,9cd7921a90bb04791113fa72304f128fef3a09a30724c8639da57628afffcae6,2024-05-23T15:55:49.800000 -CVE-2023-50181,1,1,0ad44353b7f0e64df7556b3145ea2540f95810c4c5c698e3e10352c63e80b395,2024-07-09T16:15:03.853000 +CVE-2023-50181,0,1,4c55c5b6f2718a1ad624c525451dc6e078f747281a164a28d17967033112eb5f,2024-07-09T18:18:38.713000 CVE-2023-50186,0,0,2fc7566893553d17602cd6056351966b18c9a9fbf7487f67397c412ccb6031f9,2024-05-03T12:48:41.067000 CVE-2023-50187,0,0,f9e79e1861e04ca0b0ba07ad4c02cae42db82c86165116a9ba43a1d5431d989d,2024-05-03T12:48:41.067000 CVE-2023-50188,0,0,99333eddf54988ebf2bb818a80ccb12dace8c8b929397bfd0d984100fc9a837f,2024-05-03T12:48:41.067000 @@ -237305,6 +237306,9 @@ CVE-2023-5079,0,0,08ac6672159acf69cea4333ef87da7c32cafd59333c06b74d19b42baa7321c CVE-2023-5080,0,0,6a142fa9fe4d669768c0073981351de1258996b6b98c92dd7c3370c182d5051a,2024-01-26T16:02:33.997000 CVE-2023-50803,0,0,e0245185683406393930132a94b475da6a0b1d1d07df0fd68bc97ce9d56e1e90,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,75c8b32f1c902851b302714bc7a121b33ef1436156799cadcb21e4914ed2667f,2024-06-27T16:42:15.310000 +CVE-2023-50805,1,1,8dd1e941d7c9b6e36e47da2a058defa3610df8951ef7209ed86dba5473bd1d9c,2024-07-09T19:15:10.590000 +CVE-2023-50806,1,1,08fb31c86e3ce25a5f1615e2e170472a324467b6095229878da6949af57b0306,2024-07-09T19:15:10.820000 +CVE-2023-50807,1,1,8f679fff5f64af798b971e3d74d674608065311a8027b0cd5200b56b2b714cbe,2024-07-09T19:15:11.020000 CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6db7e,2024-02-13T18:23:02.393000 CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000 CVE-2023-50811,0,0,e4d21463d439be20b918caa6cf8d80372ece22f0ede7a7aef6305c4c982019a5,2024-04-29T19:52:21.503000 @@ -238298,8 +238302,8 @@ CVE-2023-52232,0,0,9e0597adae68838d68538a7063a1c3d80e4abe07e31743f8d1565135550f4 CVE-2023-52233,0,0,bcfa6286a7b894c2bcc318b29778c32eeefcded80eb2a0c25d698da18407e7a3,2024-06-13T18:36:45.417000 CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000 CVE-2023-52235,0,0,cd0fd933ddc53865fa09d8b56f84ffa70ea224ae48315dee51674d5a7a8efbaa,2024-04-05T12:40:52.763000 -CVE-2023-52237,0,0,8265ab58b25988c0d694cd1e18ec805736e19aaf8def8ac7d4c431b654b0718f,2024-07-09T12:15:10.743000 -CVE-2023-52238,0,0,83ae63915ca2d8193ab769128923e8c594d9a4b4fe4417f40349ac13e4bd6856,2024-07-09T12:15:11.030000 +CVE-2023-52237,0,1,7c7e6a6a5caffaef8f51e94f86fe6ef9528731bd680dfaf12be13c1b39f1ce30,2024-07-09T18:19:14.047000 +CVE-2023-52238,0,1,4855251710fc43a3c878fb4b2828933a6f555b7ac2036ebc824cdc6172499731,2024-07-09T18:19:14.047000 CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000 CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000 CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000 @@ -238925,7 +238929,7 @@ CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b7 CVE-2023-52884,0,0,3ab17bbd7764403ee078e65ba1cc3c50e85e943699ba320291de13c4366192b4,2024-06-21T11:22:01.687000 CVE-2023-5289,0,0,e99a2312fffac7e548d9067401ea1735cab5340b5825bd2426e3171dd9b0909d,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,a0eebe139551581f49cfd3b7f68f49883daf2a40bfb5a3949932cb006cd09360,2024-06-13T18:36:09.010000 -CVE-2023-52891,0,0,068e66017e49948def72fec9d88b61667caaffcd38094cc73bde264d78f8566e,2024-07-09T12:15:11.263000 +CVE-2023-52891,0,1,25c0b1de89e9f6f858577c085a6c413b469aa682e557b0bce843714d2272c72e,2024-07-09T18:19:14.047000 CVE-2023-52892,0,0,61499b3f768ccc401ebae0ffacf07733ca800a4fed57a0222ab20920a0b1ac50,2024-06-28T10:27:00.920000 CVE-2023-5290,0,0,755547461c1ffe140ccfa395ab853f280b1d991be6ac36b66243260a063192cc,2023-11-07T04:23:48.727000 CVE-2023-5291,0,0,883b747bfd1d6788133af6b41df2a1418b2cdede81e8f6778f889cd9ac7f0a65,2023-11-07T04:23:48.757000 @@ -238959,7 +238963,7 @@ CVE-2023-5318,0,0,b2b21b78e6e920b84b34d0babd2bd3bd46fb832ba1461cfe1e8e77d7b65d7c CVE-2023-5319,0,0,011716ad1cd4924208b75fa68b398fb163e5251acf7722477ac885a0a20e1649,2023-10-02T20:13:30.087000 CVE-2023-5320,0,0,bb5874b579978f0df3c730d51af73f50a991af417ac1a87268ad99dc8184ae5b,2023-10-02T20:13:19.963000 CVE-2023-5321,0,0,675f38a6a314b5b887c6dcef9e72b80bb30b87b6ea33e5f5595320b5cde726f1,2023-10-03T20:58:47.980000 -CVE-2023-5322,0,1,ee985127315ef0018f666390932edde480dba9eb140ad79b0ad940ecf963851c,2024-07-09T16:15:04.150000 +CVE-2023-5322,0,0,ee985127315ef0018f666390932edde480dba9eb140ad79b0ad940ecf963851c,2024-07-09T16:15:04.150000 CVE-2023-5323,0,0,1b67d7e24289b85b58457d0d747d82f85b7a6b4c89b21566edea8d4697278003,2023-10-02T20:26:24.737000 CVE-2023-5324,0,0,f5a3e2b8c51b4b04fa407134862909d05c6414fcc20b0e59861cf061a660fa49,2024-05-17T02:33:00.820000 CVE-2023-5325,0,0,80f4bf6239809fa3400f4ec5184efa7ded1b841a67f842ed329bf73e06e0b0b8,2023-11-30T20:14:11.280000 @@ -241822,7 +241826,7 @@ CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e28 CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000 CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000 CVE-2024-1304,0,0,279cd487b9476fd1f6c48e9b147ffdce9f2fbae718f78edd3d048c2b1852071a,2024-03-12T17:46:17.273000 -CVE-2024-1305,0,1,5eeeaef42654e6eeadc80dce8a0628dc34bcb5a41f303e25e6bb555548daab96,2024-07-09T16:22:15.950000 +CVE-2024-1305,0,1,65858d129fc4ee759c91a88e76f4584235168d0dbc78dc30f252eb16188817aa,2024-07-09T18:19:14.047000 CVE-2024-1306,0,0,17c6ace753742aa246baef6948fae4f095c5e86f9a893e497e354e9fdcbe61c1,2024-04-15T13:15:31.997000 CVE-2024-1307,0,0,8dc6ec45be9b236db5f7b189cd3322f38dfc4b76bc9caf0be97ceae4e80df136,2024-04-15T13:15:31.997000 CVE-2024-1308,0,0,779e92eb8f86f1576242d727b2f521b27075ae2e12c38fe16d52227bf6d49040,2024-04-10T13:24:00.070000 @@ -242737,7 +242741,7 @@ CVE-2024-20698,0,0,c87681a712debff74de386c4bd26867a56e17e9c3f279b52fd0c11e97aa17 CVE-2024-20699,0,0,16035529e1f89acac6dd906f3756567d60913215788d2b420f2919b673f4ec9f,2024-06-11T15:15:58.073000 CVE-2024-2070,0,0,96e6b267a155e30e7af56a9cf12a74717d1ea58df3f9d2000eda21f3b659ea73,2024-05-17T02:38:01.770000 CVE-2024-20700,0,0,bdd7adac55de226187f694d70def9099b3862d1bc15e802ad84e017f5b86f31e,2024-05-29T00:15:16.493000 -CVE-2024-20701,1,1,c792cd3aa1f860e358ff324c7e5d62b8d4d4f18c18ebd0e9eee6f6ff52aa2e15,2024-07-09T17:15:10.737000 +CVE-2024-20701,0,1,8afd65c2f5507fa72a63937ce5289c1dc87e2065203ef3d0a0d72395a5324d47,2024-07-09T18:18:38.713000 CVE-2024-20709,0,0,cca85717bb81539781e203bb4477bf37d13c8f3ae6be35c0f26cc1afde064b64,2024-01-23T19:28:38.997000 CVE-2024-2071,0,0,aa8c06a441276b326ee23936161f09d6bca38ef3dea3787ccc8546dc3dcc807d,2024-05-17T02:38:01.863000 CVE-2024-20710,0,0,a59304a8fc930c9b97476f5855a86b408bff6225c6474d0147bf4cbe88ba90b4,2024-01-12T19:14:08.107000 @@ -243182,12 +243186,12 @@ CVE-2024-2127,0,0,7e732da9362123c901ed00a29dfcc3ca896b81c43d152f47d3b17084697855 CVE-2024-2128,0,0,b758ae1e45bbf3f98be89f21520e72433f96873d6cb56cc91a1f688f1fc159ac,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4c524f74551adbc3e342fac213dfeb618fea121bbe870db2406c689593d206fa,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,9fe340e5e07df3d99bdc5083493ea2da904eddf69629b14325c6709a09efc300,2024-03-13T12:33:51.697000 -CVE-2024-21303,1,1,07bb9ad4cc2c2ab437cf5d34aa42b8b6e25d0b64a26fe0d986aade6a0d020250,2024-07-09T17:15:11.117000 +CVE-2024-21303,0,1,806ee4dba2ecd80075bbca6a2f0d2987a8ecae448b51513dcd46fda568d24679,2024-07-09T18:18:38.713000 CVE-2024-21304,0,0,48660d83007d38e725ddce429eba147b85486376e1b6bde8cb2bd6a761916ff5,2024-06-11T15:15:58.253000 CVE-2024-21305,0,0,2696cc75e112bc4774a2b69e6ca1b817f313e6ea3da86ac6f29334ec63cbad49,2024-06-11T15:15:58.433000 CVE-2024-21306,0,0,eb25dd2807ab63fff934bdad07499e9a81e5baec44b0234b3784546077747195,2024-06-11T15:15:58.640000 CVE-2024-21307,0,0,ccdfa4ae2a3b06e3a02bc4796352165e8bc92e2c3f838c4b6749bf658f69f994,2024-05-29T00:15:16.713000 -CVE-2024-21308,1,1,99bcbce8f00cccbb0972195f9ff199d2f8c7bde07e325dea7924b00c53fb1b94,2024-07-09T17:15:11.337000 +CVE-2024-21308,0,1,01e079e067ac710efcd32d6f13013f513a1f05f450c943c0dfb20f4ee5eeb64a,2024-07-09T18:18:38.713000 CVE-2024-21309,0,0,d7ffbc8ab1c8ac7bc0a68a4720605c60123e348b5ddfc1cdab66e1de069b9c0e,2024-05-29T00:15:16.833000 CVE-2024-2131,0,0,70fa52fd2d9e098897a89d6196b4c5236c8b9500caeb1e1d6701bc972bd847ca,2024-03-25T01:51:01.223000 CVE-2024-21310,0,0,6fbf58c7a558d7c7913da7b1c2f4ffcd15ab08bd370725c89d570905fbfd30c5,2024-05-29T00:15:16.957000 @@ -243197,7 +243201,7 @@ CVE-2024-21313,0,0,6a908f68244cb2a41b463c207b59057deffb9921f1b9049ecb61d93d48cfa CVE-2024-21314,0,0,9dd7530ac0c5bbf4eee47258d978e6124d3a6adfa2051f298ff7eb3d6fa763b1,2024-05-29T00:15:17.750000 CVE-2024-21315,0,0,ef8351c451fb2702b38a236386963e82277a9b4d449d412b1f6fc4755fa058e9,2024-05-29T00:15:17.893000 CVE-2024-21316,0,0,b6ca907d7c0750d737e9e2d8c76d10fbc50ce1c7f52c322225f8a212d57a6988,2024-05-29T00:15:18.863000 -CVE-2024-21317,1,1,129e13d63e0f0de4af8dfd2082561c9c2a17342ac791754b3f2d306d6075143b,2024-07-09T17:15:11.573000 +CVE-2024-21317,0,1,b351e78ecb38cb3a894ed4484549685486d1f29543c13287d5412430d8022f2e,2024-07-09T18:18:38.713000 CVE-2024-21318,0,0,43e5925a5ddb2330f429bd22756bdeac2f7713f5bfa2b8afdac639b6823dafda,2024-05-29T00:15:18.993000 CVE-2024-21319,0,0,d1eec70f72f9389fe09c86ebce8b95a4809d5ea0c070820ff50d1797055f4524,2024-05-29T00:15:19.120000 CVE-2024-2132,0,0,3b8fb3b1e21708dee38931061b6e4bb20015caa6e6f92a264bd45d8ad9d9ed3f,2024-04-08T18:48:40.217000 @@ -243212,11 +243216,11 @@ CVE-2024-21328,0,0,ed5d7139f8495eda1c158abf4ab359c21fe43913846e7f1330660b86357ca CVE-2024-21329,0,0,1419a7bfbcce89566b2649311f2716242df9b9c7bcb5ef1a2f14e4af10081df3,2024-05-29T00:15:19.753000 CVE-2024-2133,0,0,28ecf87ba5fce4375715e36bbbf63dab11890409e85d1d59b752a403b0d62fb9,2024-05-17T02:38:03.570000 CVE-2024-21330,0,0,f8e1d655b992c9b28959c726d5c177eae02671429ab63d013da267aad4ee4341,2024-05-29T00:15:20.273000 -CVE-2024-21331,1,1,4925a7a74d4f35ce759e7fcd5c1c5690448b1aa62357c42b89fb1b713a6d6751,2024-07-09T17:15:11.800000 -CVE-2024-21332,1,1,5f10ca522a3c1cdc15936531b2f21f5dcf7f2256b54a6e9205ccbce9c3d6866a,2024-07-09T17:15:12.033000 -CVE-2024-21333,1,1,e52db959237ffdb99661c7696f531676f401a85609550e757282109dc43f3425,2024-07-09T17:15:12.260000 +CVE-2024-21331,0,1,661858da3d5b806bbd6e3fd02a9365dd891abf344e7a0f258d29b7f6793c511f,2024-07-09T18:18:38.713000 +CVE-2024-21332,0,1,7547f818c30e8030e5b638c5f6542e8725e5f1c738c91a9367fd1553fa49069e,2024-07-09T18:18:38.713000 +CVE-2024-21333,0,1,32c674ad4031f810b9c0dbbb41d2c72d37a995f61f37ff03009b15c87560784d,2024-07-09T18:18:38.713000 CVE-2024-21334,0,0,b712325e53c35442a2869799d740fe10eaf18b936a15203b80075d9ee5c9dcda,2024-05-29T00:15:20.560000 -CVE-2024-21335,1,1,0a3a27f08091e093c7a34972340b26be2aa4bf5a8c41e6371bbac76d9415a6ec,2024-07-09T17:15:12.487000 +CVE-2024-21335,0,1,c29de1f61276a2f5dcfbe56a83bfb43be5d7ab10131c62ed85e5800281ad743f,2024-07-09T18:18:38.713000 CVE-2024-21336,0,0,afeafd17cabd942527cf2b3cf161e0f0e38edabbdf5ba27b5e43b4c018d8b128,2024-06-11T15:15:59.553000 CVE-2024-21337,0,0,897194f99f22c4db5366a3b2e1ad388ecbf6548d8e4a64185144cbd2db0e3a5c,2024-05-29T00:15:20.793000 CVE-2024-21338,0,0,94bf44baa60f3b870d9f5f460ebbf915fa2a062d3e885201c5ca65e215b68833,2024-06-10T15:42:53.913000 @@ -243258,7 +243262,7 @@ CVE-2024-2137,0,0,cf013ce8a24981b94317ec626ffac8cba413d59652face4635246906a1e9f1 CVE-2024-21370,0,0,bce09e1fc9e3ad1be0104069e44fb161e69b791dbee5ac6ecc63bd66b409acf6,2024-05-29T00:15:29.847000 CVE-2024-21371,0,0,c0373f885b589b39c642d891c0a319ae1693b9d0a16ac9f87a82a464404bea5a,2024-05-29T00:15:30.020000 CVE-2024-21372,0,0,48fa79b0a8d5b18737f4884dee299aec176793646e369c877d911d2b7186a23d,2024-05-29T00:15:30.193000 -CVE-2024-21373,1,1,0ba997d46a9f29c4e10e8effa856cb8303b8f58361221e59a6aff44ce4ebae34,2024-07-09T17:15:12.857000 +CVE-2024-21373,0,1,4979e3e2b6f385dcb4927f046f7eec8e5da166d8fe8b5e4cf262aa0528dc9769,2024-07-09T18:18:38.713000 CVE-2024-21374,0,0,b441b6145323a790fd6d6ae1f80a41cf93d14ffa51607fb4e676b85ccb2b7d4e,2024-05-29T00:15:30.363000 CVE-2024-21375,0,0,9d4a750eeb86866e17285ca676679d696dd619e239c63240035e4a73bc711da5,2024-05-29T00:15:30.550000 CVE-2024-21376,0,0,64f72a4017f86bacc71888c2344fa1ed25e3bc9ff3dbfc2fe1a8d4acb2eb0891,2024-05-29T00:15:30.677000 @@ -243285,7 +243289,7 @@ CVE-2024-21394,0,0,6cfd4876668dd175ef5ca9ffff0475c0d39c80a77bb04245928bdf73717f6 CVE-2024-21395,0,0,04395b0981a90c2d3ecc58e065f3a6c33b5b184711c6a8743a07ed6414739441,2024-05-29T00:15:32.827000 CVE-2024-21396,0,0,81a2d5347cc77ca8aea04d77b1e85a9d929445dc02b06d831c7e095216461466,2024-05-29T00:15:32.933000 CVE-2024-21397,0,0,53a989ede4b1b39b863102885a630e084cd05821e4b8f0825a6dd1f5be39f7f2,2024-05-29T00:15:33.057000 -CVE-2024-21398,1,1,d9d533c6490091b2a7da5c29d0a0b667dd420271c880fa13c17d7a013a139f74,2024-07-09T17:15:13.103000 +CVE-2024-21398,0,1,d89df912579ac3dc81cb34a3f089836f39406e14ccbda2bbd3293bad22858ccf,2024-07-09T18:18:38.713000 CVE-2024-21399,0,0,e5c8d58198b559ca6d390e2e3becb3b2c4d248d2c9d01827f36d03e49f9708d3,2024-06-11T15:16:02.503000 CVE-2024-2140,0,0,9f1ac854258e2288aad3aaa52a4b67f533aa64897ccc17bb2319dd5a69e301b8,2024-04-01T01:12:59.077000 CVE-2024-21400,0,0,713cbf56ba709632de02c74ae4c9e138b9e20d5678c3c35efc0349a02e9ee990,2024-04-11T20:15:29.170000 @@ -243303,8 +243307,8 @@ CVE-2024-21410,0,0,6addc6653de64a6b0554d5f8d6a0d94bdac5f716a62299ea818fbbe1f6029 CVE-2024-21411,0,0,87dccb8fc188cfe3dd96c9c3a93a6159b152683f9953935417cd93cdf7f34285,2024-06-11T16:15:17.890000 CVE-2024-21412,0,0,15fcbc84e561d705d3329fe36d52ac6f3132d8a4e1421d2eae50dca16c535dfe,2024-06-11T15:16:02.980000 CVE-2024-21413,0,0,947151b0ad9489675859c46209ccae83bb837b04e5bbe77ba7b528af79662a39,2024-05-29T00:15:34.720000 -CVE-2024-21414,1,1,a73a23fd183f86d29ccdd077be05ab633d4d3a8e1ae9eee232023db69780bee2,2024-07-09T17:15:13.327000 -CVE-2024-21415,1,1,f4617f062479c9f59cd644b969a34716fb5cd7242338e1bea6ce6f3ddb8c1ee5,2024-07-09T17:15:13.550000 +CVE-2024-21414,0,1,e662fe180a11a9ec80fb61225a526100cc15d391e196615a4ebbe28715d59a0d,2024-07-09T18:18:38.713000 +CVE-2024-21415,0,1,2c1b45a293d43cea991427b75edccc4f765ea544651132f15fdd7ff3af783122,2024-07-09T18:18:38.713000 CVE-2024-21418,0,0,6fbe65289f7d87b34991c17b12db87eb2d8f0ad5b10086c98e42aa516bf11cfa,2024-05-29T00:15:34.853000 CVE-2024-21419,0,0,029987aebbeea99b8cf3ad95df60d5cac83c3ab05805c0fcb8848b83a1e3ed9f,2024-04-11T20:15:30.777000 CVE-2024-2142,0,0,775c587e23838eccc1f05d84b61c4d1b983fbea738158d2b5672ec0ee3392f88,2024-04-01T01:12:59.077000 @@ -243312,10 +243316,10 @@ CVE-2024-21420,0,0,8095c54f6c7cd893643c034872b759e526649a725cfe824be1e4663665371 CVE-2024-21421,0,0,ba8423a9f096c86c4c4746df3fafea597a8042e8f3a3594375e861377c5bff3a,2024-03-12T17:46:17.273000 CVE-2024-21423,0,0,f52403af5305ff40cf2946571813d8044bbe56c3a138a7bd1d30bf8943af6d3e,2024-06-11T15:16:03.297000 CVE-2024-21424,0,0,f0ac6080e8acf8658a413c6a67f4f2883d669628ac20bb6a474371ff2a84db21,2024-04-10T13:24:00.070000 -CVE-2024-21425,1,1,a5e5b3058abb40c2797d538b1d40ea2772141008d95451885909a10b2ee79c19,2024-07-09T17:15:13.770000 +CVE-2024-21425,0,1,5e4db18cada3988354a2399aff37230f5e9ad94f0d52c5749536f41d67f054ad,2024-07-09T18:18:38.713000 CVE-2024-21426,0,0,d73f06f12d99d30e170a8845254495fcb51b744c06092c5db75fc55896f16dfb,2024-05-29T00:15:35.200000 CVE-2024-21427,0,0,9302735195689e19167f4b48a00821853ffdb5f4d6cfa8cfd79901c61e1635c3,2024-04-11T20:15:31.130000 -CVE-2024-21428,1,1,65066e5e1a1f18c9ec121cf5f4a19086a2468db91fd71c71d5cbca231dc02534,2024-07-09T17:15:13.973000 +CVE-2024-21428,0,1,1faa314a857a1243c46499752e00a1363815447a6f2ce14bf0ffe24f562cb730,2024-07-09T18:18:38.713000 CVE-2024-21429,0,0,936a9aa46e49cbebb2c3804bcc2938038e830db3c07baa7251bfd252a42b98e4,2024-04-11T20:15:31.223000 CVE-2024-2143,0,0,14deb819eb321e1741ed1d544a86b00db6ae553f92875625000d80c03b8e5cbd,2024-04-01T01:12:59.077000 CVE-2024-21430,0,0,e24ed282c1ab918b0f674e60e1e3e08542daac8026b8e9edebd51a7f0fb4a753,2024-04-11T20:15:31.333000 @@ -243338,7 +243342,7 @@ CVE-2024-21445,0,0,95d0d7dd52273a33a963adbabf5c3e62912d37674acd08f34868678e159d0 CVE-2024-21446,0,0,215bfb2e37749423d2c1771f43e4408ab4c6c19c01d1a776623c4a461d7a6ea9,2024-04-11T20:15:32.857000 CVE-2024-21447,0,0,ee6b6887da857dbb3a0d99b0d7e56a17925e1ca3556381e55f615bac24b89d9e,2024-04-10T13:24:00.070000 CVE-2024-21448,0,0,86c46d738110b4724630aaac59304081ab699a6489d2abe1049e2edcecb19b98,2024-05-29T00:15:36.470000 -CVE-2024-21449,1,1,8551e8a51f4e0c955c884708587542ee6861a7c3ead3992ef43199d4d603a68e,2024-07-09T17:15:14.177000 +CVE-2024-21449,0,1,4e39cfb3cd411d6967b7e2640b004ca61e8bc06305906e511dcb853faeec9db7,2024-07-09T18:18:38.713000 CVE-2024-2145,0,0,04e6f2e6840884bf59259387c4daf0151c176ceea5f29914e4d91faa737ccccc,2024-05-17T02:38:04.100000 CVE-2024-21450,0,0,ba03d25a544224b919939c73f3c0e5c0df60d80b8563e099528458d18fbd951d,2024-04-11T20:15:33.050000 CVE-2024-21451,0,0,3a68c9cb135fb79bfe9a5852a24c7fd1f5875fcd798816d60af8d6fb9ada644d,2024-04-11T20:15:33.143000 @@ -243516,10 +243520,10 @@ CVE-2024-21725,0,0,bdf9c93b4a7ea1086142df5e839e5b4f02916d7ec678326728b59bee6aa76 CVE-2024-21726,0,0,f58382291c9f1461cf13ca0d051f8f0f0c9fa0278dc3151fc85e945cfade72ff,2024-02-29T13:49:29.390000 CVE-2024-21727,0,0,b27ab17b4cf9fa0c975b07ecf9db3a828358193d90226e060ebcb50e44b258d3,2024-02-15T14:28:31.380000 CVE-2024-21728,0,0,0d7074802f0bbe539004625d566f506428ee0f00b86885184a6c8af5d1b929ba,2024-02-16T13:38:00.047000 -CVE-2024-21729,1,1,7712d3cdffb22838e25de1a47ba355b62bc21c8240e7f6a12af77d30ffac4130,2024-07-09T17:15:14.463000 +CVE-2024-21729,0,1,323b866f3a426c4524bf30c256bb8a38e42cbe03a3b81d0fafb845525576ba84,2024-07-09T18:18:38.713000 CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 -CVE-2024-21730,1,1,f2d32ac711f21fcacb58b13f0bd88567797e111c24b9c3d611d8a821e2f56924,2024-07-09T17:15:14.580000 -CVE-2024-21731,1,1,2657d01781c659fc60ae22482b91cf3da38eb9dac06d4ceb49b5c474cda74ac4,2024-07-09T17:15:14.660000 +CVE-2024-21730,0,1,70f0b39105e999b5280280e09b6246d9c173be5b4bf0ebcafab058ffe10ab052,2024-07-09T18:18:38.713000 +CVE-2024-21731,0,1,fdc6430ce2614c9f5a971159af768cc415c40357765a8a9351fa1ec1e22e3783,2024-07-09T18:18:38.713000 CVE-2024-21732,0,0,7a8bdaaf9609522ec086cb797e1911cb25fd0ba362f1f69c1302646455757ad6,2024-01-08T18:51:23.740000 CVE-2024-21733,0,0,6a822bcba55aae3b24fb21f4cd21d6c25ecbe736276d21ef2a3d97f8f805110a,2024-02-16T13:15:10.190000 CVE-2024-21734,0,0,652c558bfc482936599b7d824ea3a77e00ef63d3b87116475d92e963662baebc,2024-01-12T16:34:40.870000 @@ -243544,7 +243548,7 @@ CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef CVE-2024-21754,0,0,8ef2295f7c494130c3546062d5b7242e4337431ca2e375a211a83f535e1e5a64,2024-06-13T18:36:45.417000 CVE-2024-21755,0,0,3649ad429f456b06338c76a7773a7effa9162638dba6b0cd829505e767eab517,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,7e40cab71c47f1a51d786a1ac8dd4278e504d9e4172c58909f1d2b21a6d9e3a6,2024-04-10T13:24:22.187000 -CVE-2024-21759,1,1,44b435c6e769b83edf0858049c761b150a0fb4773fe3d898c80777df29e99e2f,2024-07-09T16:15:04.357000 +CVE-2024-21759,0,1,bd8c6239e64cdaec340e4bfae4691940714716e3441d4cfd71c8882faad1f306,2024-07-09T18:18:38.713000 CVE-2024-2176,0,0,0b1ad65e2de8a26d446910c44762983b7c0d3648d9404f5b09d2ef1eb4a5dde1,2024-03-23T03:15:12.287000 CVE-2024-21761,0,0,8ab59e75152f9d6936d0a5e25258149f4630555ed80a24ba673592c858a212ca,2024-03-21T21:04:27.653000 CVE-2024-21762,0,0,0b64c1e53b9988082cc4d4d5e4617e40dc5892047d7c058b50bd69b94b2061c8,2024-02-13T18:21:14.607000 @@ -243552,7 +243556,7 @@ CVE-2024-21763,0,0,54e313ef6643113065b8c25f39977290a8571e9f1bf4228724df0e21f6857 CVE-2024-21764,0,0,6a104de5d97cb4f3a858343729857223fff5cb50c4e9c48631f456ff6696c0b7,2024-02-07T17:15:22.520000 CVE-2024-21765,0,0,947b9032fb7fddaec08edb8303868e32d790a3891c7dd9151a92130caac0d55f,2024-01-30T22:14:09.087000 CVE-2024-21767,0,0,560c878e0455c54736544b206060f6b1d7fba4f1c6ec991803ccd4c7ac257dfe,2024-05-17T02:36:09.757000 -CVE-2024-2177,0,0,9a6411aaba0b087ab13b82f0d4b650aab6b55755effd88de5b9afa61ede8f2db,2024-07-09T14:15:03.953000 +CVE-2024-2177,0,1,99ada9a39a5daea04ac265940d818e149320c1a9b4b13a91dfb0e7f5b5a009b2,2024-07-09T18:19:14.047000 CVE-2024-21771,0,0,ff0afef9e42e6fb9c23e4d4386a81c0240bde8524a0a8802ae4c44d51c80ada9,2024-02-14T18:04:45.380000 CVE-2024-21772,0,0,f8e42b69b99cf9d844db5f683999682647c8799992e8b6c4015423ebac9e6e9d,2024-05-17T18:36:05.263000 CVE-2024-21773,0,0,c0e4344a82222deab8e235cd4d4af199cda76b795391156ebbba4fe72f747e55,2024-07-03T23:15:02.007000 @@ -243692,7 +243696,7 @@ CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c967 CVE-2024-22017,0,0,eda129adeae4ecfa4b275b7bc6bb5638800d036cf47c85fe2baa6a803f743c01,2024-06-10T17:16:18.773000 CVE-2024-22019,0,0,49190872720c4c119c607cdd3cd1206179dcd2b84c9cd0a4595a1040743a11fe,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000 -CVE-2024-22020,0,1,88ff76bfe0c9eaa1fbdb7d31f9820a087d7de1ef7b4814b2fa9b55b511676e66,2024-07-09T16:22:17.840000 +CVE-2024-22020,0,1,56e2cf9f05f5e347798c1cc85e525de5d4d601bc1bbfb2ffd2b6893095268df9,2024-07-09T18:19:14.047000 CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000 CVE-2024-22023,0,0,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000 @@ -243723,7 +243727,7 @@ CVE-2024-22059,0,0,50d90b3cb7f9bf66ee5ba944e169106caf70e42a039b7301c7281a7acc269 CVE-2024-2206,0,0,89bb78f285eca92521ddf90479f409077fb3db3aa39188b40e35723bcbb7e9a7,2024-04-16T12:15:10.187000 CVE-2024-22060,0,0,8196312ba8e15fb6a16f27d7e77100a283cd190872d1648c8877d6e45bc67f8c,2024-05-31T19:14:47.793000 CVE-2024-22061,0,0,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 -CVE-2024-22062,0,0,30eb64c851ac2e0f5d5e312f3f5444532acf2c62361093dad51f5a99c953080c,2024-07-09T07:15:03.157000 +CVE-2024-22062,0,1,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11ac3,2024-07-09T18:19:14.047000 CVE-2024-22064,0,0,c629ceda13b1d36f0f60a6ea95a2c77f87751465f007aa3a59355e800a89dfe9,2024-05-14T16:13:02.773000 CVE-2024-22074,0,0,959aaae231895ad1dab22cc5268e854f7f776fc321d5804e91f78b08ec2f5391,2024-06-07T14:56:05.647000 CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000 @@ -243902,7 +243906,7 @@ CVE-2024-22268,0,0,8ac3cbde6056dd76380b18daea36d084eaf68822fc6e2befa66f62359bde9 CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000 CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000 CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac1fc,2024-05-14T19:18:31.490000 -CVE-2024-22271,0,0,45b4a844a4cf83f5c4c1f4ca2c782e41d47336679792834f2447d93abf873a62,2024-07-09T13:15:09.887000 +CVE-2024-22271,0,1,c0012cafee5a155326795527ed039ce317b548c2bca2c5af59826786e5c7ec4e,2024-07-09T18:19:14.047000 CVE-2024-22272,0,0,adae0aee6ad029e4fd483a8691d818f9453c2dae8103d6feb214d470c1deea16,2024-06-28T10:27:00.920000 CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000 CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 @@ -244653,7 +244657,7 @@ CVE-2024-23558,0,0,0e030b3ddee305097ecf13a5fc93f84821f79454ea82e12098abf6fd591f4 CVE-2024-23559,0,0,a67d6aa6c2589ae3d37731867bb9f648e4b5d30ad4eba2e61f15676037d7636b,2024-04-15T19:15:09.577000 CVE-2024-23560,0,0,39262a3d1a015486541c11a9acaae3509226c69e322cbf4650c4cfad43009fa6,2024-04-16T13:24:07.103000 CVE-2024-23561,0,0,a22fcf5dfd91b5d6ac506750080d833a3983c3c231b1230f7c5930b307faa639,2024-04-16T13:24:07.103000 -CVE-2024-23562,0,1,12952da69874778e60fe418e79ef5c932ed4b0ca541ad719a2eead52f7dd5fa2,2024-07-09T16:22:18.987000 +CVE-2024-23562,0,1,d20fdd582216e583240193901695646b3a6ab5eaeccc858f0b01b2118b5ac525,2024-07-09T18:15:09.083000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,19b2dcf6e3c1e0697b2bea4d3507ea8b750bc4bf3b04f60b20452c989aaf2ffa,2024-05-14T16:13:02.773000 CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 @@ -244732,7 +244736,7 @@ CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32 CVE-2024-2366,0,0,561eca4f7d46892009230ef936eca60ce1d593865f21bb5667643256074aa468,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000 -CVE-2024-23663,1,1,31c4be55a20a038be0705c0a894b6a658f20e598ca4e40c77eb6bb2b31960fd8,2024-07-09T16:15:04.593000 +CVE-2024-23663,0,1,a0a3ed3df4d5626a5302174ac1a0f8e6c38b86838f81ba6d27a3d83274118ba0,2024-07-09T18:18:38.713000 CVE-2024-23664,0,0,223da0146b6b94ab9cb0566d6cdd05e60bfe84534772354c328f4fdd10e6300f,2024-06-03T14:46:24.250000 CVE-2024-23665,0,0,d0ae5dc4c21e463a036872a51bba24eb7c6c68e90a0a4df19a2801982726f049,2024-06-03T14:46:24.250000 CVE-2024-23667,0,0,305ff047de3815ba4f0d799b8bcc54e25aba76f554642635f5afc53c27ff4025,2024-06-03T14:46:24.250000 @@ -244983,7 +244987,7 @@ CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8 CVE-2024-2399,0,0,f2ed8991b7f5b58c5d0da553893384268ad252865f28d0238c77e027b3f6c098,2024-03-15T12:53:06.423000 CVE-2024-23995,0,0,81de383387abdf9366d11c37730b7848e88d64753a8810e47f8a0832d8c25d4e,2024-04-30T13:11:16.690000 CVE-2024-23997,0,0,ef5ed82b52199290419df226903d49f9642c5092d24fb995fb9a2b7f20196c62,2024-07-08T16:41:17.500000 -CVE-2024-23998,0,1,463262dbca07048f11c2d6fea168e73cc5fa7a3032757dc98b7129a752040582,2024-07-09T16:22:20.347000 +CVE-2024-23998,0,0,463262dbca07048f11c2d6fea168e73cc5fa7a3032757dc98b7129a752040582,2024-07-09T16:22:20.347000 CVE-2024-2400,0,0,82b734e73e945d6c0e34c9b62506a785c5b1b229f740be0471c259696bfd026f,2024-03-16T03:15:07.307000 CVE-2024-24000,0,0,c0e25ee371e3e2954ce1c31994df30792949134b707de19bf25452c7e2c5373a,2024-02-13T20:30:10.053000 CVE-2024-24001,0,0,ee1c723e23fc182642c00ee71c6c1dbca341b34ff9a2a69da4bee1c4da91e395,2024-02-09T02:10:25.807000 @@ -246179,7 +246183,7 @@ CVE-2024-26004,0,0,246387e032da3fec432fd431d962194949239cd6f63c6608ded252f81c760 CVE-2024-26005,0,0,21f5813ff10f50303a70abaad99d1a58bb1553a9ae84175693ea090d825991d5,2024-03-12T12:40:13.500000 CVE-2024-26007,0,0,7138fd3af890dadd804713b56a1647c12755a4de384c07dd51c6253ec0018804,2024-05-14T19:17:55.627000 CVE-2024-26010,0,0,7639bfdab44636cfda0b068567a85c7e60adff2e8754e8b5b1da3474fce81969,2024-06-13T18:36:45.417000 -CVE-2024-26015,1,1,a0645e15b7c759eae8c3044ec1cff390a9abd16399f05d99914c7ad4169dc3f9,2024-07-09T16:15:04.810000 +CVE-2024-26015,0,1,91bd66afc3c2abf869a3d76bed02c232c2c3a3c155933975bf6c3d38e6149fa7,2024-07-09T18:18:38.713000 CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 @@ -246346,7 +246350,7 @@ CVE-2024-26180,0,0,2642e54652d0be099215ac2592071956276bb0b78149f1f8d9ba58e9dd3a0 CVE-2024-26181,0,0,2a579a51eea04f794c563f527c40239ff7a5f8b6ab08f5fcec0f641fc0002559,2024-06-11T16:15:20.530000 CVE-2024-26182,0,0,485ae09810036858e090542cbab32de37612825a546d21a345f4c90039e51c49,2024-04-11T20:15:34.707000 CVE-2024-26183,0,0,28caf9fc957a2961602c26f17ce14c17950995b5ed55b7d5cdd2976488235c63,2024-04-10T13:24:00.070000 -CVE-2024-26184,1,1,7e1533cac30fe3c48a5a80483470f5b9c32d0bf0c7c38cc6cd4af142a1acf2e2,2024-07-09T17:15:14.773000 +CVE-2024-26184,0,1,c6bf8399c0c2c858a99833a0db5cab8472642ac239671958d37f809e5c40ae4c,2024-07-09T18:18:38.713000 CVE-2024-26185,0,0,130b8669a79bb3c03d063ec6d023bc21cdb8bceab7308616143e2d46571b0503,2024-05-29T00:15:37.420000 CVE-2024-26188,0,0,4b7ecd3e893c25c5940f1f83e6c6503e0577c00b972acf0cadf444960172e146,2024-06-11T15:16:04.713000 CVE-2024-26189,0,0,1f95108b705e718e6e21af2a68b22c3ad95b6094387a864e506ddc314b4c700d,2024-04-10T13:24:00.070000 @@ -246438,8 +246442,8 @@ CVE-2024-26270,0,0,d6490f7916a3708559119c4b06da9ae5a8dea9c128a10a8333261b0f96cb6 CVE-2024-26275,0,0,a8dddbae7b22d48aedb9f8490428c277edf739c267986dae35b653016096b12c,2024-06-11T12:15:14.017000 CVE-2024-26276,0,0,ebaa4df659ae506807515f6f8e27db4e0be919eedbd9a6cec30771898d5d94b8,2024-06-11T12:15:14.153000 CVE-2024-26277,0,0,c804494b992b99c1c40050703fb804ba44997edf7736c67dd07771e0c8850ad9,2024-06-11T12:15:14.273000 -CVE-2024-26278,1,1,a99134ef50a91b153ce6cb50fae2afaec92ba497808d6c21ea810f35e41598bf,2024-07-09T17:15:14.970000 -CVE-2024-26279,1,1,5f4bf8fef180f222d64b22879490bc6e84213d615f6fc0dfad44da1c70041cb6,2024-07-09T17:15:15.047000 +CVE-2024-26278,0,1,b4f30c0206435462f938eb0aa6ce4486df14c46a6e06f78aebcebb1f84e4c17d,2024-07-09T18:18:38.713000 +CVE-2024-26279,0,1,c4bff815edfd814e00fe609d743e5381326d6b9a8eaa1af2ba2c2661f06cf980,2024-07-09T18:18:38.713000 CVE-2024-2628,0,0,74f1b0a8f98a3a2a42e54dd1de06ce591c355dd248224902ad7ba323d1c0caa6,2024-04-01T15:23:07.793000 CVE-2024-26280,0,0,38ddaacb3fe8b7d89a935c9bba67b29e4cb635c7acf4968449143e2fc6e9c2ce,2024-05-01T18:15:15.537000 CVE-2024-26281,0,0,d398cdbeaa123e10721276d9f64c2d88a8b8d78292a048222ab02485f2a77624,2024-02-22T19:07:27.197000 @@ -247195,6 +247199,7 @@ CVE-2024-27178,0,0,3eded18cfaaf88e4de20f21eda16e350ac2f063fbf5fa075d6984ff3d63c1 CVE-2024-27179,0,0,85f9bd060c25072746b1e3bfaefabaa31cf907d9fa1300683bdfc57bd5ce21d2,2024-07-04T05:15:15.337000 CVE-2024-2718,0,0,ea13884a6a94fa11cb595762b38780201943e5e1759d2219b058983f7ee6ca9e,2024-05-17T02:38:27.407000 CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431d16,2024-07-04T05:15:15.450000 +CVE-2024-27183,1,1,417ffc6bd7063fec7bd96c46e37b00d7c45c974136b1a342f73145e45402885a,2024-07-09T18:18:38.713000 CVE-2024-27188,0,0,0a250e5949948eb56c4e7cf9856d7a21d10f3e8b950f62db4c44a6dd21c9f08e,2024-03-27T12:29:30.307000 CVE-2024-27189,0,0,f6bf1baac7929f9527b0f7511a814163f14995be7b373386888de1fd63322bdd,2024-03-15T16:26:49.320000 CVE-2024-2719,0,0,191dd01198f47a9af904634855a631fe4efca9e2b4d3c220fae17d02ea191711,2024-05-17T02:38:27.497000 @@ -247300,7 +247305,7 @@ CVE-2024-27305,0,0,b3f2edbf169d953c39bcc940e16d0680bda3e4c24593a205df513ed3ad926 CVE-2024-27306,0,0,e3c8bceedc02ff93d1109367053f304eaec63b774580e568b9873e57c8ef131a,2024-05-02T03:15:14.943000 CVE-2024-27307,0,0,0637b05d2a36e47d121bc1fe1beac809e09e2be90d0aa4c4cb901114110f37d2,2024-03-06T21:42:48.053000 CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad595214f,2024-03-06T21:42:48.053000 -CVE-2024-27309,0,1,18416b733d6ac4edeb2af296593281a1b6deae1e8a8956ba324c7cabf7f2e6ba,2024-07-09T16:22:21.487000 +CVE-2024-27309,0,0,18416b733d6ac4edeb2af296593281a1b6deae1e8a8956ba324c7cabf7f2e6ba,2024-07-09T16:22:21.487000 CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000 CVE-2024-27310,0,0,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000 CVE-2024-27312,0,0,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000 @@ -247351,6 +247356,8 @@ CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5 CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000 CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000 CVE-2024-2736,0,0,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000 +CVE-2024-27360,1,1,ef90b211e38e26de7cd6ad266f9667b57752920efeb0c78d69800f0173df48ef,2024-07-09T18:18:38.713000 +CVE-2024-27362,1,1,f6cf094287aa89a818448bb40454e447472a3a4a0dff2e33d58ba4042270372a,2024-07-09T18:18:38.713000 CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6439,2024-06-27T16:42:33.073000 CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000 CVE-2024-27372,0,0,65a4e6083a0e4ea46660ce2ac40164e0a6aada29e2b404abc66d633a42676525,2024-06-27T16:41:21.603000 @@ -247531,12 +247538,12 @@ CVE-2024-27703,0,0,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f CVE-2024-27705,0,0,3d747f0757e381b42c2775f784e825713efa67635f4ff8b104a1a16be5b625e5,2024-04-04T12:48:41.700000 CVE-2024-27706,0,0,c91aee23aaa0ed501da15123d608c9d5855bcbcff43faab8a1a227af822acd84,2024-04-04T12:48:41.700000 CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000 -CVE-2024-27709,0,1,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000 +CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000 CVE-2024-2771,0,0,01f06fef9237148af046435fd2b082ea403ae03287612b14625abf4c1ff71e2f,2024-05-20T13:00:34.807000 -CVE-2024-27710,0,1,43de68ab0b570faf0f4235d817dd8f7006250699af7435eb090311caa9f412af,2024-07-09T16:22:22.570000 +CVE-2024-27710,0,0,43de68ab0b570faf0f4235d817dd8f7006250699af7435eb090311caa9f412af,2024-07-09T16:22:22.570000 CVE-2024-27711,0,0,f805b380d9d7b3579fe240a41d85003817c32a10af1921c104d28f1f2076e639,2024-07-08T15:49:22.437000 CVE-2024-27712,0,0,6fc8ed0d101e6ceb7706c955c931abbe7938537802eb95845288301d0849d779,2024-07-08T15:49:22.437000 -CVE-2024-27713,0,1,64018e29ddc87ebe0d2c41750aa91592739ce29d689cc79bbf60462239f515eb,2024-07-09T16:22:23.383000 +CVE-2024-27713,0,0,64018e29ddc87ebe0d2c41750aa91592739ce29d689cc79bbf60462239f515eb,2024-07-09T16:22:23.383000 CVE-2024-27715,0,0,b53060ac5f161ba9f8c11867640af89e771d5c1bd0a1ca5106a6746844ca160a,2024-07-08T15:49:22.437000 CVE-2024-27716,0,0,b641573cb295179e8a45c3c6f4e5e6326128a1395653bab45519462f6e6492de,2024-07-08T15:49:22.437000 CVE-2024-27717,0,0,24b56efd365305b6bc14b31a5e0ebd3ded5b43adf71ab9f369b01e76538e669f,2024-07-08T15:49:22.437000 @@ -247571,10 +247578,10 @@ CVE-2024-27774,0,0,6fe31e2c0003d4fab016c3154c886020f7c2bef625382f41f7a60dc74c0ef CVE-2024-27775,0,0,a887ec832dbcf6f0b1b703ebc438ac1eb2747b129f8cfe7b452debf6096772bf,2024-03-28T16:07:30.893000 CVE-2024-27776,0,0,6275d390ba958ed1bba8b1d4de2ca05eb959bf7d338960cf80f1a89694c26077,2024-06-03T14:46:24.250000 CVE-2024-2778,0,0,42cbc20405f3ee35374ef4ea72808c22dd795c7f7e01e3e442c0f4aa51ec7373,2024-05-17T02:38:29.967000 -CVE-2024-27782,1,1,54eb81d782bc00893849905872a2abbf20abadd7293cbb28c762dfb66431386d,2024-07-09T16:15:05.017000 -CVE-2024-27783,1,1,dd564ba918f1ee2b4e9183fe0825722e8a1d8611a85ac9af3d2187c3872eee85,2024-07-09T16:15:05.240000 -CVE-2024-27784,1,1,8e236293870747af6b28a2c4ff7e15ce0e921837790a74dbc9f11e168998e7ae,2024-07-09T16:15:05.470000 -CVE-2024-27785,1,1,2adf7c0ae862d62511a3570ee996ee835a4272d19ce026d227d0a20ebd1d62d1,2024-07-09T16:15:05.687000 +CVE-2024-27782,0,1,e5b24ccd8a38025138ac4bccfc423ac888c0e53db0761ef285f722813e3c8f81,2024-07-09T18:18:38.713000 +CVE-2024-27783,0,1,843eca78edb6b7b190409b20b2ca2b257ac52c0706c37c2065c84bbaa7686a58,2024-07-09T18:18:38.713000 +CVE-2024-27784,0,1,5fdb48b4d88c54a558119d5a76be9df1f065cefd1e4e90116ce5d08cd9b768f3,2024-07-09T18:18:38.713000 +CVE-2024-27785,0,1,6c5f72aced89e419782aa86b1dc3a6e353aab58945e9953191628100a8620cb3,2024-07-09T18:18:38.713000 CVE-2024-27789,0,0,e8af3b8395ebfe2a50ae6a05a1719125fcf49e2fa7ab9962ec195038f09bfe15,2024-06-10T19:15:53.183000 CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000 CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 @@ -247658,7 +247665,7 @@ CVE-2024-2790,0,0,beedd0090f34846cee86bfcc16559ecd216425fdfa14e63be8297a23ca53ac CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 CVE-2024-27901,0,0,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 -CVE-2024-27903,0,1,ccdb0f52fe0bc4ee02a36296f374b0d64aa1d0b4db223d51f201349e3ddfd00e,2024-07-09T16:22:25.120000 +CVE-2024-27903,0,0,ccdb0f52fe0bc4ee02a36296f374b0d64aa1d0b4db223d51f201349e3ddfd00e,2024-07-09T16:22:25.120000 CVE-2024-27905,0,0,11f71bd2f04a983e03ffa738540da2ab3b19fd866be937104a685343c8bfc7f6,2024-05-17T02:37:34.130000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 @@ -247802,6 +247809,7 @@ CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0a6f,2024-05-20T13:00:04.957000 CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000 CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000 +CVE-2024-28067,1,1,0af34335bd5c50d512b8c109c02a349e9b931cbcda3258c91f6a4aa62f373bc1,2024-07-09T18:18:38.713000 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-2807,0,0,ceddd5b2cd81d31fee5f18b8bacde7f821c00daf332201952118e19cfa7a07c3,2024-05-17T02:38:31.100000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 @@ -248157,12 +248165,12 @@ CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000 CVE-2024-28745,0,0,15394cfaddabd1c5537f1c3a0b8bc4d088d58358d421e9d9475a38fad6a5e44f,2024-03-18T12:38:25.490000 CVE-2024-28746,0,0,d3498b36c10813c20b7b0bd242f4720e9fb3001ed34e2421ffa42d433ac177f0,2024-05-01T19:15:22.510000 -CVE-2024-28747,0,0,2457b3ef5e592f9cd9a3077c4ae44dc88040d8ad37bfb56de82dc81bffd62507,2024-07-09T07:15:03.563000 -CVE-2024-28748,0,0,43824eb0c7bca0ecea779136defeedf49d1d18b907bb3d1c743ba39627de5e3a,2024-07-09T07:15:03.827000 -CVE-2024-28749,0,0,feb13fccc1a9714cdacf9a3c383227f19c3fd5606c61e2539f8172e2af20bcd3,2024-07-09T07:15:04.067000 +CVE-2024-28747,0,1,c78e80f5c4544dc2a8f09b5ef2088da98a86ced007bf2e33d8d4deef0b571d02,2024-07-09T18:19:14.047000 +CVE-2024-28748,0,1,41a55744096b15da89d6cd6d823e4020b0c486debc3afaafc2870aa3383dfaac,2024-07-09T18:19:14.047000 +CVE-2024-28749,0,1,7fd406c104be877229c16d54498390b8e7d76b6c8ce02ef56c47da3ad34b957d,2024-07-09T18:19:14.047000 CVE-2024-2875,0,0,92d71d07ab4e0709b268a90efae23b1c10201ebc6c2d6fbe418598c3280cdb35,2024-06-14T21:15:51.043000 -CVE-2024-28750,0,0,e9323b9d0e1498283c6813ac03facf9da8e105b4c220fcd5c4b13a33a19f240d,2024-07-09T07:15:04.323000 -CVE-2024-28751,0,0,e80f193d486e3042ca99d24f1392fad769bb199457fb4d7868ab95be341edad6,2024-07-09T07:15:04.587000 +CVE-2024-28750,0,1,d780513969d95a2a8e4659069a1cd3d6cd97b1c91cdf4b1dec2cf83a7354c7e9,2024-07-09T18:19:14.047000 +CVE-2024-28751,0,1,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3d0d,2024-07-09T18:19:14.047000 CVE-2024-28752,0,0,a16f681908a766615df1cd587bea3e4ee74065b6052a6c003d4e0e780474c086,2024-06-10T17:16:24.460000 CVE-2024-28753,0,0,0c956b637de08c532b696a8c6f16bc6d8d72060ebbfb1be48c2cca87aad5de9b,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,5dbc765f1d498ac39b0aa2a583d691b531f5eca3e556d44de526ef3d4678683b,2024-03-11T01:32:39.697000 @@ -248233,7 +248241,7 @@ CVE-2024-28877,0,0,883039bbb8a02fedae5005218a87450c4b734f262948f425805257c253ab9 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 CVE-2024-28880,0,0,d86d3a57226b47e9756d0e2de7fe8eb3bf99b87dc35f89b5848778ed1b1b3b47,2024-07-03T01:51:53.260000 -CVE-2024-28882,0,0,6c985daa6feb0ec8701f7901bbede50c0950ada4d735b2cbf3c52d0444363d4c,2024-07-09T13:15:10.117000 +CVE-2024-28882,0,1,1c2deedb6322663ef74bf2fde692de72490de1c075113953e26f68fdd4a28ced,2024-07-09T18:19:14.047000 CVE-2024-28883,0,0,0da2cc6c41f6d079048ec96a542a244e3daa5cbbca8e93005185c421836d3999,2024-05-08T17:05:24.083000 CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28889,0,0,bb3c202469f2e51ff05aa6d43099130e609fec5b2294b197effadcfbe55ab53d,2024-05-08T17:05:24.083000 @@ -248246,7 +248254,7 @@ CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e99 CVE-2024-28896,0,0,286c9b14277dfd3fb198ad35d3d66add8da721df3cae192b0956bb3da3951188,2024-04-10T13:24:00.070000 CVE-2024-28897,0,0,0a5ccdd1042b8db9d056fbeeae5a0c8cc4acbb19abca5fd7375a157081a30561,2024-04-10T13:24:00.070000 CVE-2024-28898,0,0,59a427cf57f4f6010a775df10963b4a8d7529faa0ab726e1f146fa99467525db,2024-04-10T13:24:00.070000 -CVE-2024-28899,1,1,13f517cbbdf082ec70f0658cd80965e84da5ffdf4654d35b270626cdb989c5ad,2024-07-09T17:15:15.210000 +CVE-2024-28899,0,1,3c8934dc2c560f2764a4b9c29a0dafcc4cb6eed3eeef739923c8942481ca6602,2024-07-09T18:18:38.713000 CVE-2024-2890,0,0,4c3942fb63df92293ceb0810767d0c0704e4aa5c317aa4d330866ad74b1803b2,2024-03-28T12:42:56.150000 CVE-2024-28900,0,0,b203b9ee55719f6f3e9fdafd8b34c8a81dcda2e283e54fe9556ae1c07188173d,2024-04-10T13:24:00.070000 CVE-2024-28901,0,0,b7af6274f7d1fdccd02d3c13882167a0dca44278227b7e3e605a80f750921dec,2024-04-10T13:24:00.070000 @@ -248277,7 +248285,7 @@ CVE-2024-28924,0,0,e56c98b63ce2e4258a2d75e2373c55a7d6746edd02a048bc1eb9cebdf2664 CVE-2024-28925,0,0,20033909185b9c185081a9969da53bd8f679d2ea39ce9304b0cf4f1e109932ec,2024-04-10T13:24:00.070000 CVE-2024-28926,0,0,dac590423dfd555a11b375502c621f94d73a470e3ca81141ad413c673f60b632,2024-04-10T13:24:00.070000 CVE-2024-28927,0,0,7b60ead6d0c8add00213f0a2270ffcaa01d66fd20479fc38afa4300f98829500,2024-04-10T13:24:00.070000 -CVE-2024-28928,1,1,8a158f1cefabf7c295f496f18b26ca2d524cbda539a56950e3feb2c6c74414ad,2024-07-09T17:15:15.447000 +CVE-2024-28928,0,1,108a4ad8f578e8f58fb61b0d062f5c06c7343777475f0069bb87c49561c86952,2024-07-09T18:18:38.713000 CVE-2024-28929,0,0,e9f8c9e034e8b99dffb84878ed544f8e62db0ee14c14634e4036cf67630d5cc7,2024-04-10T13:24:00.070000 CVE-2024-2893,0,0,c88e74e0c5332c8990b73daa3524c28f6f8d35b414c6c14c7b123a6f8c0dd848,2024-05-17T02:38:35.643000 CVE-2024-28930,0,0,ddb7bea8c42e1b48a9ad16003154217758cbc24083fbfc7476bf94146e8432d3,2024-04-10T13:24:00.070000 @@ -248572,7 +248580,7 @@ CVE-2024-29309,0,0,45f1a5c62c6adb2cfc37fb8e478a65e7e38cb4d4cfc5c99ecb35ab6584ea9 CVE-2024-2931,0,0,a6d520754016bbdab2d7efa74efc39e3254a7b8cd183192dc94878921c91c9ca,2024-04-02T12:50:42.233000 CVE-2024-29316,0,0,a77a66080b82cffb666cc5dc96a72ca9eacad7eb3c1a78f29a15ae578e7a1db4,2024-03-29T12:45:02.937000 CVE-2024-29318,0,0,3bd80ca4ed2a21d168ac76c12fc53877e0cf37b2c12f34546ddefc9f9e0a12f8,2024-07-08T16:39:39.810000 -CVE-2024-29319,0,1,bbb0862aea68d5a01a34ecc5b39e1d6e8c1c3d81ce4dfc0412f430759d0ae56e,2024-07-09T16:22:26.077000 +CVE-2024-29319,0,0,bbb0862aea68d5a01a34ecc5b39e1d6e8c1c3d81ce4dfc0412f430759d0ae56e,2024-07-09T16:22:26.077000 CVE-2024-2932,0,0,a3c1266ff6f47dc95aa30613f077416ccee7f436989a8ec80d1c9241ff3cefc9,2024-05-17T02:38:37.813000 CVE-2024-29320,0,0,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e6ab,2024-07-03T01:52:23.320000 CVE-2024-2933,0,0,18d1f298f2b762b4118efe96c450d68f8ae481c12b8472bb73a5759391f8f4eb,2024-06-03T14:46:24.250000 @@ -248970,7 +248978,7 @@ CVE-2024-3001,0,0,66bab939613a94deb73304b6deb25424200d075c09e8139f8f22efc6eef531 CVE-2024-30010,0,0,a019179ea0a530a5e61cfaa994b9dad2883ce70298de04721b98ecb7aa22badd,2024-05-14T19:17:55.627000 CVE-2024-30011,0,0,a84abc3091bcd60a91da1e881203c536a803a2bda45d06dcf6d6cb4142cc2cac,2024-05-14T19:17:55.627000 CVE-2024-30012,0,0,4072c02407549cc404c82f344cb5e026b8dac7ebf877af789648efea8e9752a9,2024-05-14T19:17:55.627000 -CVE-2024-30013,1,1,f120989059c1b1c8bdb3b67a41d789f3c1a3d6148cd20c33855154546e94c4b3,2024-07-09T17:15:15.660000 +CVE-2024-30013,0,1,ae97d2770bd03e2b2add1c5517aade3f670719c532b9775670555646b88165ca,2024-07-09T18:18:38.713000 CVE-2024-30014,0,0,ad222f78b6f0066a40a71ea26221d6352e053660ff1366cc9bb51df6d4ffe211,2024-05-14T19:17:55.627000 CVE-2024-30015,0,0,b67e5257fca310f8d4f735485c7bce162d4042ee7942095561e379eb52378e35,2024-05-14T19:17:55.627000 CVE-2024-30016,0,0,e55cf7b609467842ea49f6a27218328d291007bf96cb4293d5eb3e9efabffcfe,2024-05-14T19:17:55.627000 @@ -249022,7 +249030,7 @@ CVE-2024-30058,0,0,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4 CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000 CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000 CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000 -CVE-2024-30061,1,1,d5465ae8b1ea3419c85a59fbc5599066870e087e6050efdb7327089d25402490,2024-07-09T17:15:15.990000 +CVE-2024-30061,0,1,9dd31d01c0a97c02ed44f588a75013330dcbf5bec49d70f333c4e1cc81bed139,2024-07-09T18:18:38.713000 CVE-2024-30062,0,0,4bfd7750976332cbf3138fa7bc5c8220095dd88b267408654f472c79216ff00b,2024-07-02T14:23:40.820000 CVE-2024-30063,0,0,a6c18ee19af78813a7336be786c53d09e4ab4504175485aac84c4fe78f9e753b,2024-07-02T14:17:47.710000 CVE-2024-30064,0,0,7a179afa450eed85d7ee628ffb2feb5ee613adc6c371f16fb51f2d7c19805799,2024-07-02T13:51:08.770000 @@ -249033,17 +249041,17 @@ CVE-2024-30068,0,0,a1853b66a3ca63d9e1db2679ce86760e29487453a6e379cd863d076b282d4 CVE-2024-30069,0,0,82015f4b8e614a1d355a8835c7e0836f4b046ead4c90adf992b8de296dc590ed,2024-06-24T20:53:31.637000 CVE-2024-3007,0,0,b6f0abc8e1c348ee9d7c4f6997a6bd9bf4e4e4454fbab31e6ee3487fc6b69651,2024-05-17T02:39:40.200000 CVE-2024-30070,0,0,cfab610908275255a24cf3b10cd8f4bd9712a293aa1ee6bd1f8b45d9e9ead97c,2024-06-24T20:57:17.147000 -CVE-2024-30071,1,1,9af11e2a63704c105fc9d17accbf004d0389fafafabfee82a24c8d986104e4ce,2024-07-09T17:15:16.233000 +CVE-2024-30071,0,1,53b078f0a2da8d7452665a7daddec4fe886e202040cf372f06efb3f70b5e141e,2024-07-09T18:18:38.713000 CVE-2024-30072,0,0,7f4a3f5a406dd39aba4a8b0c0c9ecf2c404d3cfb5b7e6199a3a6886ab3d06067,2024-06-24T20:57:43.443000 CVE-2024-30074,0,0,d3aefb91e27e2266145ee7670527e9b8a1ddda8b6a8e9dd3a6addb01671fcaa6,2024-06-24T20:52:05.630000 CVE-2024-30075,0,0,35e541da499778a2c9a4f809098c755f8f046b7ed246fb16327eebd90fbc12a4,2024-06-24T20:52:28.660000 CVE-2024-30076,0,0,d1fd1cb854371e560db433a723f5a04fa8be11d298685dc384ec123d68e5282e,2024-06-21T19:41:03.030000 CVE-2024-30077,0,0,1ad81c261d405cce7235823df3f7e47ae7230a36de8a3089498e4571a963ef78,2024-06-21T19:47:55.517000 CVE-2024-30078,0,0,53313a17b1c9a568dce9696bc8ba8477da00c12d85817849861eede05c781080,2024-06-21T19:48:29.993000 -CVE-2024-30079,1,1,e9b49ec407926c40ed497d6b5b7a3160be910eda4263ec70d7dbad55fb6d8ebe,2024-07-09T17:15:16.467000 +CVE-2024-30079,0,1,f89dec58a7e705895b34ed4df8c05e5e9a7aedeb5573e7b8dbca83ca499b572e,2024-07-09T18:18:38.713000 CVE-2024-3008,0,0,38114235bd0d847f323f6f6f0b2b45ba228af3f4b3b2140fd5d29a91c2eeeb7d,2024-05-17T02:39:40.280000 CVE-2024-30080,0,0,c299675de4a96d93eee1a5e28be354af6ac28e3e5f6d5e73e3997e8f7e7e8d82,2024-06-12T14:19:52.130000 -CVE-2024-30081,1,1,156a649565ad9e553c6e6f23c66fb44843ab0863cb497cd2a3982d697130656e,2024-07-09T17:15:16.717000 +CVE-2024-30081,0,1,b7afef3d78e5f3a46afc76397620315578428c8caa60ce41206fe238d16a5bdd,2024-07-09T18:18:38.713000 CVE-2024-30082,0,0,f833f169c35e59492507b4bfccb783d4dd108cfb4c7d78a0f05a95cf3029c5a4,2024-06-21T19:49:24.627000 CVE-2024-30083,0,0,e40522ea1ea70353bee3490843028d35595ffa84a9c4fb48ae87616d4bd7763a,2024-06-21T19:02:52.253000 CVE-2024-30084,0,0,b7900b470bef282a3f3b5e1ec10e6b35920c13b18afd959af02f0717faf4ab0e,2024-06-21T19:03:20.890000 @@ -249060,7 +249068,7 @@ CVE-2024-30094,0,0,d777dc62fb55a07a0ed6bfa3277c11fb7e69ed648b7727805eaad2e5e349e CVE-2024-30095,0,0,048f96f3e5623a3029a75354689ecb95e74b9de2d640d31eb83d020ed961bdf6,2024-06-20T18:07:39 CVE-2024-30096,0,0,b16928df459df0a0a9efa516a53e9d2dcbaed528ad71c923de834e957208e151,2024-06-20T18:07:54.607000 CVE-2024-30097,0,0,25944033c29661f17e1de2ec1abf0192df5977f8e4787bbd3e39721d628dd07c,2024-06-20T17:51:00.143000 -CVE-2024-30098,1,1,fbce677a0f7004665a0501ef4bb42d7b2af27e7be565ee100a9d4c62f76cd5a2,2024-07-09T17:15:16.973000 +CVE-2024-30098,0,1,e2de29bff26c409a95cb8cff064fbb256772ddcd182c6f7b0914f7df575857a8,2024-07-09T18:18:38.713000 CVE-2024-30099,0,0,dc33acf12182e6454e1a3ecdc588bc9137c14d73f94ad2ded610bb6667a6bd3b,2024-06-20T17:48:07.827000 CVE-2024-3010,0,0,27666e8ead6e529570139216617bb06d1f8e2b7e342f568fb8736cb62dcd604b,2024-05-17T02:39:40.450000 CVE-2024-30100,0,0,36cd7c5f393fb236e239b3f39b42c20bf7d831c3fa7a8ef645f75fac62acdc05,2024-06-20T17:31:07.867000 @@ -249068,7 +249076,7 @@ CVE-2024-30101,0,0,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804e CVE-2024-30102,0,0,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000 CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000 -CVE-2024-30105,1,1,445e400eac9c59a561cbf5b189aad340134f3d18b968650e6e298990e1ee54f5,2024-07-09T17:15:17.200000 +CVE-2024-30105,0,1,52a5b4632fae1c2024c4e6c9fe95d9d4c7272820f50a5cbc07094e82c40f3804,2024-07-09T18:18:38.713000 CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 CVE-2024-30109,0,0,6a8a59a3bf8868bc11960f386f3b1ccf692b85f5ec7ca1c3028fdcd4f6f4463b,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000 @@ -249240,7 +249248,7 @@ CVE-2024-30311,0,0,9d217824227954911dd5a3bdb06324510e4c2d800d17c3d3d8e7c71eb2bd2 CVE-2024-30312,0,0,07602b35ce17259a48da425f51ef913f48381cf49e65fcb7583eae5ee1007be0,2024-06-10T18:15:30.880000 CVE-2024-30314,0,0,1c6263a9ec0b1b4c544180b477adf01c0311e37fed95feb72da46c3babb52d01,2024-05-22T08:15:09.777000 CVE-2024-3032,0,0,3ff0e9ee56a036f5520ddd218b15f57f43b4ef20b5bd57e06a8e81c2e3d08ed1,2024-07-02T14:45:48.633000 -CVE-2024-30321,0,0,0e9d8282ad1da3c419b54a1b539b88140b01b0ba279087341b4f02203a2220f4,2024-07-09T12:15:11.707000 +CVE-2024-30321,0,1,05dfc6cf7e35712029c16c7af28e5f504c7c0532c369978e163056dbfa0fbd46,2024-07-09T18:19:14.047000 CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000 CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000 @@ -249649,7 +249657,7 @@ CVE-2024-3087,0,0,2eabb0b82de74e04d57af862b0ef8d1ab9f31d79ecdc14e2f4a7cf827e4e88 CVE-2024-30870,0,0,37b7a88a34251dc57dc2e1e67f39f073a8023981f3f33607b63aeaf82f42d3c6,2024-04-01T15:53:18.060000 CVE-2024-30871,0,0,d803e8a22e3cb0ffc63ce535e7477c16423f4c13198cbe4b49e5311fcca22ec7,2024-04-01T15:53:18.060000 CVE-2024-30872,0,0,f945e56669ed547eb36a2b5a674eaf51c6f019a23fe630e2694f76da90849356,2024-04-01T15:53:18.060000 -CVE-2024-30878,0,1,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 +CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,b76e56285dae3e672fd2930967cb2b70f8c09fa7b390563b0eb22cde9d647db0,2024-04-11T12:47:44.137000 CVE-2024-3088,0,0,8d27898456917f48098d1226f5c034715671a7107169d3ea33c6594f791b2d8a,2024-05-17T02:39:42.873000 CVE-2024-30880,0,0,89a9464fb2b59a11c3e5cf00085fed02609b7cfff66de2ef8b60b0e85535f8f0,2024-04-11T12:47:44.137000 @@ -250080,7 +250088,7 @@ CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d9 CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000 -CVE-2024-31504,0,1,99a488f4090bf5d86c347d87f39e3694242654292610f00e4fc87fb32bb4d500,2024-07-09T16:22:31.613000 +CVE-2024-31504,0,0,99a488f4090bf5d86c347d87f39e3694242654292610f00e4fc87fb32bb4d500,2024-07-09T16:22:31.613000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-3151,0,0,9347bf7ac28e84ca877a361b1eac7ef280766a4b0b29aa18ee59e0ed7a4dbbe2,2024-05-17T02:39:45.290000 @@ -250291,6 +250299,7 @@ CVE-2024-31952,0,0,5f29e6541e024f9b1bd72bdf8ee8e438dfaedf18a9a002e17369656e46ca5 CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 CVE-2024-31956,0,0,56222bae986fe87c83c759cf706c4f2021e893534f083e7f4ddb4dffa4c53b2c,2024-06-13T18:35:19.777000 +CVE-2024-31957,1,1,43703613c7bea46803b3bce5e3c9db2f1fdcbd1e957e3164e13b43bb337eeb57,2024-07-09T18:18:38.713000 CVE-2024-31958,0,0,92a0a8c4e3002c821a3c846306658e74a9964a41bffea58fc59bb9ff3c43087c,2024-06-07T19:24:09.243000 CVE-2024-31959,0,0,881dd9c88eb573b82854e8881ea0e763e3c9111ab6dfe4157e823bc664d8a323,2024-06-07T19:24:09.243000 CVE-2024-3196,0,0,d5a1cb2b9527bda623e9f193c03f796a5c33bdfc24e5ed9d8b0d65fcf6304b33,2024-06-04T19:20:17.433000 @@ -250306,7 +250315,7 @@ CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc379960 CVE-2024-3198,0,0,23f647a2f0b4c9d8282aac5d503e6a564aa810d1f345d5d2765d544a3ea2c117,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,5493ce321a7028d8f5abef4cb41ba8ec559703b9634518d9a316b2b5b284a44c,2024-05-14T19:18:31.490000 CVE-2024-31981,0,0,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000 -CVE-2024-31982,0,0,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000 +CVE-2024-31982,0,1,ca819fb29ae5a9933f586e249427b665ca795ba0a4d65d4ccbf67a6cd9ff647a,2024-07-09T19:15:11.370000 CVE-2024-31983,0,0,04aafc38e27953c11e399edb313d7df5a8b5f3b11c0f563063bbf689c3f06f86,2024-04-11T12:47:44.137000 CVE-2024-31984,0,0,e4a4c0ed2b94945397eb14802568460ee1926403a3fa635b3335a39b1342069e,2024-04-11T12:47:44.137000 CVE-2024-31985,0,0,96eba814f8ffd38a0877505a36212af3b265e63db0ebdb3b6fe17b13401c04fb,2024-04-11T12:47:44.137000 @@ -250364,7 +250373,7 @@ CVE-2024-3205,0,0,94de9427276f5133bdfe91db56cbfc9958b517e8a2bb181bf6c470a918feb8 CVE-2024-32051,0,0,e28a1e0c21bc5f7358767662bb9a7b790bf9856f0536eacca66c7e2c127c26a1,2024-07-03T01:55:45.237000 CVE-2024-32053,0,0,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000 CVE-2024-32055,0,0,a213f783360c7e7e5c751638bd8ed19254b8685175117f85c8904c8fbdad727b,2024-07-09T12:15:11.970000 -CVE-2024-32056,0,0,b9bd0bd7feb1bb9f2b7a39607649079e3afce23341eb81576a93715271799af7,2024-07-09T12:15:12.097000 +CVE-2024-32056,0,1,6566e31320c110393355d6c7535fde476f12857eaefdd2a3304f83a31836e635,2024-07-09T18:19:14.047000 CVE-2024-32057,0,0,078c17a88295a2a6e7b92d4b887d9abb150458460277298935515a5329f38267,2024-07-09T12:15:12.333000 CVE-2024-32058,0,0,4d0077f1fa7f118df9a7a052f4a7c3307ee75478c7f081875cca949b6f2deecf,2024-07-09T12:15:12.453000 CVE-2024-32059,0,0,e4adb901ebc74150b46043987210d746fd8f9a6e237ac71b277eeff73f20a0c0,2024-07-09T12:15:12.570000 @@ -250477,7 +250486,7 @@ CVE-2024-3226,0,0,22538a15ec2928b97d8af0c0dccde27c92434562358d7198046e84039fa826 CVE-2024-32268,0,0,ea660c910e15f3606747fa7586b7f7f075c28fded5db811b5df434089e7b4ab1,2024-04-30T13:11:16.690000 CVE-2024-32269,0,0,0142f3c45d36ad639eeafc5315f1fa2973454aa07cda0ce0b715e55142f5d44d,2024-04-30T13:11:16.690000 CVE-2024-3227,0,0,b7888e40c309eec617406e2a5679f992e8abeb4b92975527ef40097ea2d1b52b,2024-05-17T02:39:47.993000 -CVE-2024-3228,0,0,beaaacceec7732b8797530656367a0794fef4829c1bb90ea59d33bf6d4189a3c,2024-07-09T09:15:04.430000 +CVE-2024-3228,0,1,6783ce31f1a0f729fb4e866f1afd448663db085a2c44e3d3dd92317f9cefaaf3,2024-07-09T18:19:14.047000 CVE-2024-32281,0,0,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0f46,2024-07-03T01:55:57.420000 CVE-2024-32282,0,0,e5357aafcfe3da38abc16b53a2fe91b224de61a5ed23923f7ac518d25d82dbfb,2024-04-17T15:31:50.160000 CVE-2024-32283,0,0,c72ca6989168ee21133166c85a18b30a403543bd2802d4602b360f26e8ac9c38,2024-07-03T01:55:58.170000 @@ -251069,7 +251078,7 @@ CVE-2024-32983,0,0,ce81205444cb1663f019c108840b9121773b51fa4288ee35e7c4848583e9a CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971cad,2024-05-01T13:01:51.263000 CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000 CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000 -CVE-2024-32987,1,1,cd0f7199de723513ce52543cf252a044fc8b855a810d5e63df004a949afa9910,2024-07-09T17:15:17.410000 +CVE-2024-32987,0,1,d90a8edc1efb1f71ee40f5ed6619afc1441fb79c18a76360ab3c62ba3ab1616f,2024-07-09T18:18:38.713000 CVE-2024-32988,0,0,b75452c4939042145070e3930ee08a16366c08052457addaa745b6ead2778cf4,2024-07-03T01:57:22.273000 CVE-2024-32989,0,0,87c157b1e3d25527b7d1928b44314ff5515bc68d28ca4b835a710f703915d021,2024-06-14T08:15:40.147000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 @@ -251271,7 +251280,7 @@ CVE-2024-33498,0,0,fb8f18e956d524eefb25b8c979392a23414256963793640c42d97698053f2 CVE-2024-33499,0,0,8cb0843c38b353e79b24fe74f6b05c8071b02f4b63b3bcb8893f4033cc9c6492,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,2b8baf70bc71563420116bceae3da55f775969025d5793968d110aec63c6ad2b,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,c6295613b84990917f1a57c080fe27562d29b01b0e6d3200ab007d211e070981,2024-06-11T13:54:12.057000 -CVE-2024-33509,1,1,c5e937c32e61e4e94ef7d647f9de2af0df9ef00d138b09ab97d2a57897b43f3f,2024-07-09T16:15:05.950000 +CVE-2024-33509,0,1,2cf2b13f051ea58173e86430794d89ee85d6c282b45a17661dd0bc523ac923d8,2024-07-09T18:18:38.713000 CVE-2024-3351,0,0,9ad5e91d8f23e74b177e32892aec306da9ca113a4552ee690c2a76c864ee2562,2024-05-17T02:39:51.683000 CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 @@ -251400,8 +251409,8 @@ CVE-2024-3365,0,0,72815092a8c597fcb65b9f4966eb0474a56b71117ba0af8f5274e1b80bbf93 CVE-2024-33650,0,0,19d8d8a0b27cf4dde85e5f92d8bf04c572aaff417d777c3294978343c2e4f677,2024-04-26T12:58:17.720000 CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6dcf1,2024-04-26T12:58:17.720000 CVE-2024-33652,0,0,f10385ddf63819e6bfc4cfd1af98d21aa48a5904778b552fb96e778ca7071131,2024-04-29T12:42:03.667000 -CVE-2024-33653,0,0,2d25d10f1272bf89c6f6caac3cd8ef0a98e00cd81aceba08148db25d40d29985,2024-07-09T12:15:13.553000 -CVE-2024-33654,0,0,80d252a11e2b409734278c9ae11dfbb3dfc19b14d27fc07fbc755e680e6ce1bf,2024-07-09T12:15:13.773000 +CVE-2024-33653,0,1,04ea659034ad213d448852c13a227cd9a5e238659c870000ad255e58e42dff2a,2024-07-09T18:19:14.047000 +CVE-2024-33654,0,1,5ec07a21e3f0cdcb0256916b62eaa4e7717e336560b80750da7ad480447076c7,2024-07-09T18:19:14.047000 CVE-2024-33655,0,0,2a1a57d16853f2dbeafe3a1d5d9bd7aba78e93864ecaf7bf30fb94862628a49d,2024-06-10T18:15:34.520000 CVE-2024-3366,0,0,cee4987ed8ff1f296ec0608c2f2a4293250401226181ff89b21a21c72172c537,2024-05-17T02:39:53.090000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 @@ -251508,7 +251517,7 @@ CVE-2024-33858,0,0,908335cb5f6f9fce545a8d8e396c240343dfa0c627880c76928e0dfd92f71 CVE-2024-33859,0,0,c39c79672554484e65368e295f5b8216c172323c2ed38b2ef6778fbe14be0853,2024-05-07T20:07:58.737000 CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000 CVE-2024-33860,0,0,4edc8dec2f427c2816a0216d7c9e23f7b50c2414633de446e641048438fa012d,2024-07-03T01:59:01.367000 -CVE-2024-33862,0,1,f8e6fbde7d91036c44b60868b8695e843586dd830cfcecb85ff8e5cdfe99ca18,2024-07-09T16:22:35.020000 +CVE-2024-33862,0,0,f8e6fbde7d91036c44b60868b8695e843586dd830cfcecb85ff8e5cdfe99ca18,2024-07-09T16:22:35.020000 CVE-2024-33863,0,0,c260069bf74562524b59f29e5ae47ab85abe94da31d2a1859218017be058cb0f,2024-07-03T01:59:02.140000 CVE-2024-33864,0,0,61b38f0dc43ac9d0068f6da9de00a6e65ddc35f21838a32f075823f961986d6b,2024-07-03T01:59:02.930000 CVE-2024-33865,0,0,9f1dd99cceb321d30e7627b12a8d7830d5875309e5d742338b8087f86b779deb,2024-05-14T19:17:55.627000 @@ -251668,10 +251677,10 @@ CVE-2024-34096,0,0,b211b538fffe9abfd3a63762f76226325b711bcb377209279662a8a0721f8 CVE-2024-34097,0,0,80fabf82621e388228ad3681519752bd50189e2d3b21266b60e2b336e675dc88,2024-05-15T16:40:19.330000 CVE-2024-34098,0,0,b12c4c03c14c7ac462d32d4a1e50d77fdbffead011cc26736694e970715f1621,2024-05-15T16:40:19.330000 CVE-2024-34099,0,0,a5986ac74e6b192dfee0f6656002b6da38300bc4846a845af7e18d0e591fa17c,2024-05-15T16:40:19.330000 -CVE-2024-3410,0,0,c53fce96cfc896d0a192fe75fd3ed96ed1fe978944f4a2ba72589b1653538b5b,2024-07-09T06:15:02.263000 +CVE-2024-3410,0,1,d3f1a155755667926cb55b7bfbd33efb5c0e26bee1f4306e65461688d01a869d,2024-07-09T18:19:14.047000 CVE-2024-34100,0,0,d3c0a25a5afbb7abe23e48a0ccffbfabed32f430bdde6425683076da7ff2f5a6,2024-05-15T16:40:19.330000 CVE-2024-34101,0,0,d4650521d311c5f5db989961cb59afe8f4d3fccf28beebc265bb44f9beb6fac8,2024-05-15T16:40:19.330000 -CVE-2024-34102,0,1,8b1e6e557dce53483243926c2b72d923bdfc128d2c064f0699990d66fcdbe8e2,2024-07-09T16:00:38.170000 +CVE-2024-34102,0,0,8b1e6e557dce53483243926c2b72d923bdfc128d2c064f0699990d66fcdbe8e2,2024-07-09T16:00:38.170000 CVE-2024-34103,0,0,8e858e6deebf3dd74486b084ebc01e723dadd4c1741289465f9eef03525519ca,2024-07-09T15:36:11.363000 CVE-2024-34104,0,0,0c3b9794948346667daf712c1fa8aea7e59869808e596eca4e201c3b2e06e87d,2024-07-09T15:36:40.730000 CVE-2024-34105,0,0,279c20cbee5e4f9fb4c4f5bc11b2ac4f0b15f01288e2ef51f37efbef66bcba62,2024-07-09T15:34:26.507000 @@ -251690,6 +251699,7 @@ CVE-2024-34119,0,0,2b28f435955ad18fc8fcb42f0ece270dcf2db721e55508a9a5713cf979769 CVE-2024-3412,0,0,eba0eb1a658dd1d7813104d95660e0a431a5e786fc8e6854f237ea1b5879eab4,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,5d7df179ca1b4156f6cc057947fff0d548e9af4c6b85c2f9635b6b268004f3b7,2024-06-14T20:02:45.567000 CVE-2024-34122,0,0,4f9228b802a53076ae2e05a9634541c34d86113269eb50413207e641d1aa51eb,2024-07-02T17:44:45.700000 +CVE-2024-34123,1,1,5431804bb3b81fdd893e84b08a9163353bfc50042610bef00f3a49bf02a45843,2024-07-09T19:15:11.493000 CVE-2024-34129,0,0,d3dc43049d80f783794d9399825be80ea683040539452e8a7be93120bda8c4de,2024-06-13T18:35:19.777000 CVE-2024-3413,0,0,8bf7e231eaef8a1fb270998ee982f12463c5a7d17ff17eb8735dbc8fc584bd57,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,89584332f9dd3125064424fac4aabed722eb075df05ba25c9a02617aa8a6856c,2024-06-13T18:35:19.777000 @@ -251912,7 +251922,7 @@ CVE-2024-34476,0,0,f460d7b07cd8e1102230047a90895024b7118c0a722ec4264bd02b84a90ba CVE-2024-34477,0,0,1582bb27a51733ef5d8216b768cf631f7623fa6704a59528ef32a8f5c53cec81,2024-06-07T14:15:10.293000 CVE-2024-34478,0,0,e041b25b36e3062d0ab338fb8a5bf2a23de65e7f383d14a7d54f9bd405368aa0,2024-05-06T12:44:56.377000 CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000 -CVE-2024-34481,0,1,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821efc72,2024-07-09T16:22:36.033000 +CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821efc72,2024-07-09T16:22:36.033000 CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000 CVE-2024-34484,0,0,627f49dadca95e26dd01857c2e82a7ff7d913e52fd5d19d3f5a26ae697877b79,2024-05-06T12:44:56.377000 CVE-2024-34486,0,0,26f6d0ef1222cf4bd0474871265bd9abd6351340002c593000a39a9f2c434af7,2024-05-06T12:44:56.377000 @@ -252011,15 +252021,15 @@ CVE-2024-3467,0,0,f3d3ded26da1ff40cb7ce9044f06d10da868ecf8c657bb03487a95cc57367c CVE-2024-3468,0,0,6bbe60d0879e290e30537ffe4a101c3b7c2eb02820a408eaf36ef669c7ee7262,2024-06-13T18:36:09.010000 CVE-2024-34683,0,0,57f33302e0e1383af68f9608971b574f2348ee1ba8843154fc93224fbb8e249d,2024-06-11T13:54:12.057000 CVE-2024-34684,0,0,f13e9960dc41706e42f4935ca84a9d2f683382b7e93743a6923148ca6654eab6,2024-06-11T13:54:12.057000 -CVE-2024-34685,0,0,599fef26d3e9353b0e44e4f834bd29124a0eee0b88baf7c58621d11bf109011b,2024-07-09T04:15:12.090000 +CVE-2024-34685,0,1,6c0abbd09eda128efba5497623837275fb243a4eda78f11081bab1a492aa22c9,2024-07-09T18:19:14.047000 CVE-2024-34686,0,0,7af176def25b884316086a3c169e2999baee313c40e043953fcc8ef9decb4a68,2024-06-11T13:54:12.057000 CVE-2024-34687,0,0,4ff76c42affc0861ee718b9e208e6eefdbf0a3ab639bfa3166f3943bc94075ba,2024-05-14T19:17:55.627000 CVE-2024-34688,0,0,66fff955b629aa6883569d950a703da0f073f684f77574846b0584730e15d6f7,2024-06-11T13:54:12.057000 -CVE-2024-34689,0,0,4e0a1aa30587f4beffba22c5b7083106741f4a3e113a0ca515f11da3d865865a,2024-07-09T05:15:10.873000 +CVE-2024-34689,0,1,d47216632f972f573c8ef9c1d84e96a37e9ecb77d44cecb1c079c58ebadb19fd,2024-07-09T18:19:14.047000 CVE-2024-3469,0,0,89a04cf68ae33ee1037c8a13e9431c4d00d2106abb2ae6d7191ba817489a1fcd,2024-06-13T19:36:21.350000 CVE-2024-34690,0,0,823a2e1ae33b55e0d3769be79c59e7f42483b5ff6dba621f60a0402d90d83ba8,2024-06-11T13:54:12.057000 CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25abb,2024-06-11T13:54:12.057000 -CVE-2024-34692,0,0,8319862b3a6af638016114f7420272c99e32111651681c26ab36193f2a17a299,2024-07-09T05:15:11.183000 +CVE-2024-34692,0,1,54b818ffa84c3ac603216a956b4502204a56bf1cc1e6434f41ac1e540f11d7d8,2024-07-09T18:19:14.047000 CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000 CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000 CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000 @@ -252029,7 +252039,7 @@ CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53 CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000 CVE-2024-3470,0,0,736c8b21abac392de8987478bb4430873353b2c43829321b68bed57cd49a65ed,2024-04-19T16:19:49.043000 CVE-2024-34701,0,0,5a8c02ffa2fcadb317d10fc6ec8b451b4dcf3f6eab6c63ebf616f401a02dac46,2024-05-14T16:12:23.490000 -CVE-2024-34702,0,0,b06f9b0c991710625b75171b9eae08f5a86dc2af52bc4d299e153a398e2823da,2024-07-08T17:15:11.233000 +CVE-2024-34702,0,1,e4c36b2387b197db74e05dd2797662d2befbefdc6966e452199e1f4176c362f6,2024-07-09T18:19:14.047000 CVE-2024-34703,0,0,50ae767dd64caa4e000da1f40c8cdbe5042bb6b22c8a9fc5a9800ebff102bcb2,2024-07-01T12:37:24.220000 CVE-2024-34704,0,0,48d6359679289248ce803dfb7b75c17011aaace7b08a8c9d1fc68e47f081bf3e,2024-05-14T16:12:23.490000 CVE-2024-34706,0,0,4726580e4aef314a5fbec04fe3b48a640bc06fa468e915ceb8e4adce9150430f,2024-05-14T16:12:23.490000 @@ -252049,7 +252059,7 @@ CVE-2024-3473,0,0,ecf07ac84ad9a3f593fb990c7a6940d333eabefd6a4358103eba0f21665023 CVE-2024-3474,0,0,92034c6e8e03ef9947dcf9fd02cc16997c4bf0b4b196a87ecd9d32a4fbd7f10b,2024-05-02T13:27:25.103000 CVE-2024-34749,0,0,fe5f41bd42e695276d38161b9a2d636fec6ebfca2120aa0bc8cb065f0e443352,2024-06-04T19:20:02.877000 CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000 -CVE-2024-34750,0,1,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000 +CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000 CVE-2024-34751,0,0,3bc824c76b005bef3c5502f774f511888cffc942b3953fc4e78f3f0d8ad9e615,2024-05-17T18:36:31.297000 CVE-2024-34752,0,0,242ab90c6a96e91b737168caac935dedcfed36964913472cce8df4bff8adef50,2024-05-17T18:36:05.263000 CVE-2024-34753,0,0,7b0cd788f7c911abd584636d01bf6bddefa9337b34131499a0b551e2bc6c99fa,2024-06-13T18:36:45.417000 @@ -252077,7 +252087,7 @@ CVE-2024-34772,0,0,635f5a0bcdcc084928ed60d40a3f5691181a54a2efa05b50e13ad74622471 CVE-2024-34773,0,0,8d4786b71411a201832db647dece110e046d5ed6169dce1446e93616263bacee,2024-05-14T19:17:55.627000 CVE-2024-34777,0,0,241250eac73524748eb5086b6b92bdea38568ca1ebb8b3f151f19ab25319a6c6,2024-06-21T15:58:51.410000 CVE-2024-3478,0,0,ae882595ac6fe06ab517c1e505d55eeeed4b5c0450cbd6b83825ab78d9e88f1e,2024-05-02T13:27:25.103000 -CVE-2024-34786,0,0,94d1c061cc5f13dffb4f68e0e197de19d4c89677c31a8380fea1af84a624bb00,2024-07-09T02:15:10.177000 +CVE-2024-34786,0,1,7e8cb80185704202113f9da64eeb79cd413e4b998d966b2b2f4137b8800de467,2024-07-09T18:19:14.047000 CVE-2024-34789,0,0,b4abe5a3fd205f47118c608999fff7fb705b59bf0f04c59cc3f88812458f1961,2024-06-03T14:46:24.250000 CVE-2024-3479,0,0,fd58a9eee7829eb22d6cfb17d87e6b7652b13a6666535069e70c5a2768e8dce6,2024-05-03T15:32:19.637000 CVE-2024-34790,0,0,9e31f1a476eb6c02a36285de2f1caa75b634dd2719e2ac168a65fe68e0cc5979,2024-06-03T14:46:24.250000 @@ -252320,18 +252330,18 @@ CVE-2024-35252,0,0,758f2260a560b6c02096318d9e5edde43e70f9b910f09bc0f0910e28a06fa CVE-2024-35253,0,0,7f3cc01c59f69efba5c97cba42113678e0d740b7944571f1b3655b792d644968,2024-06-20T17:13:17.437000 CVE-2024-35254,0,0,0c738596f4374792f0d4315cc158b4782661a82b949045579afd98f6532c04a8,2024-06-20T16:16:47.070000 CVE-2024-35255,0,0,9bff5ed53913f2846bd2f5d5a3fe64503b901621ba9a1cf70d44fee71319dada,2024-06-20T16:31:46.127000 -CVE-2024-35256,1,1,22d88fdfbb442014ce1933d1229e02afc2e1ec4b5137db4511ca0218cff46c80,2024-07-09T17:15:17.623000 +CVE-2024-35256,0,1,02ed685a6b220df6871bf26ee6a3328a3b5797612615cbe0cbaeb8267faa5c86,2024-07-09T18:18:38.713000 CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000 CVE-2024-35260,0,0,bae5987a3d9c4653f4a8ff7faa6c237ff82527372850961d3f63629ac612e217,2024-06-28T23:15:11.457000 -CVE-2024-35261,1,1,e19e39349629b96e1bee712633f7e6bee9d2017128e5f4cd9c474878a9085ee2,2024-07-09T17:15:17.857000 +CVE-2024-35261,0,1,5f25d0e111b76a16024f56cf79c378c50c3a99d57e8da9c74efbd7b3821644e2,2024-07-09T18:18:38.713000 CVE-2024-35263,0,0,1694ba7e5ce9d31723d43812241a6c815afc20ae5a287a58c23b0184e83d765c,2024-06-20T16:32:31.287000 -CVE-2024-35264,1,1,84e268d574a6f8bfe8e80bfe45b8a7aa4f80453b548ae22fa2d74702f93a0f57,2024-07-09T17:15:18.213000 +CVE-2024-35264,0,1,527a52757584b33fe84b365a35d3b9912a6f918b7ffcf06f1ead53650b953791,2024-07-09T18:18:38.713000 CVE-2024-35265,0,0,2963d76a456cba4a49f25860d2cc93fc7331d28365d372cc188b58c478b68d21,2024-06-20T16:33:28.080000 -CVE-2024-35266,1,1,1d57d2323702ea6b831da7a2b8b3b7f98f02c82625464fbf25bb861cf9e5720e,2024-07-09T17:15:18.413000 -CVE-2024-35267,1,1,c27a5778a96373837451d4c9cc6eaadaa19759cdbd2db31f35048082d45b79ff,2024-07-09T17:15:18.630000 -CVE-2024-35270,1,1,58f5c15e1cf5f0da867355e355b72f285b36f3b8b4857b563bda564dbff0c20c,2024-07-09T17:15:18.820000 -CVE-2024-35271,1,1,ba2f915c0e577935ea2baf7c7e60b2212d43471734bf054d205dbdc285c1cacd,2024-07-09T17:15:19.023000 -CVE-2024-35272,1,1,84a56b22ee6d45059abe5b5e48319529433297eb6fc1ac4a5c8e04960be49dc8,2024-07-09T17:15:19.217000 +CVE-2024-35266,0,1,b6418a79a085410ac53acd32288e6323907d90f41be74e29039f54d53251b5e4,2024-07-09T18:18:38.713000 +CVE-2024-35267,0,1,fb620b1226ba2547c525a537ff7e95eaa1c31a4f99daa8db8d9d5e3a0f6d6a93,2024-07-09T18:18:38.713000 +CVE-2024-35270,0,1,53a3de43f899ce09451cdd7cdb68731f75d0bdcb50c82f8fa160335e5bd99e01,2024-07-09T18:18:38.713000 +CVE-2024-35271,0,1,75e5a43bba1a2d488af3749f6bb4b6d3a5117ea0af6c654e52058f93d0ab9f0d,2024-07-09T18:18:38.713000 +CVE-2024-35272,0,1,96e211af7e730d959b7b775469c2e727a89fed490cd6a7bddba6d2f3491ec57e,2024-07-09T18:18:38.713000 CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000 CVE-2024-35283,0,0,80c087b52accf20db1ec4ad086b8699369207093a56ca1d349d7c5f6028bda2d,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,ee24a2e7de9810383b7ae424a9dbbfe06080409833dff0969376cd49b76d4dd0,2024-05-29T19:50:25.303000 @@ -252480,7 +252490,7 @@ CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c CVE-2024-35627,0,0,4a039665766224ab2309171105fbc890963796bdfb66945f84a5ba2663f6bfff,2024-07-03T02:01:57.493000 CVE-2024-35628,0,0,2c313b2d5cf1c891710a64b767f44ab49e131c2c45bfba95fd1cab6ac44d46a3,2024-06-27T13:15:58.550000 CVE-2024-35629,0,0,5e80f8e30b8e7ad09d457f272fe181427a56dad2c38472133e9c4c9c94534324,2024-06-10T21:06:02.157000 -CVE-2024-3563,0,0,88dcd5cfb4772545921c340ad4f6e92e9aafc9f439cfd5ff57b883caf89d4938,2024-07-09T09:15:04.670000 +CVE-2024-3563,0,1,aca79b6dab4db31bd972be824ebd5f508a917d5dc8e5a99eeed880f31ac793c8,2024-07-09T18:19:14.047000 CVE-2024-35630,0,0,d2b99481e1d25785f899feae2f2b2deb084dac85df61f77063521999b38c24e3,2024-06-03T14:46:24.250000 CVE-2024-35631,0,0,76aaafff73e321cf015be139fbb8c4627ee4855e04e086f9bf89874f24967daa,2024-06-03T14:46:24.250000 CVE-2024-35632,0,0,2ecfff3052dc8e97b24e8b79f80b354f7cf674eb5cb790f7af7da383bedda46c,2024-06-03T14:46:24.250000 @@ -252634,7 +252644,7 @@ CVE-2024-35771,0,0,528377e8b245533dbff20e4b0dd7328468397780793d88ed8bf6cc52e2f75 CVE-2024-35772,0,0,2d0d9c98f803d200fae5d0e084d548bff2c25e4891c370629239ed163d3750c6,2024-06-24T19:26:14.460000 CVE-2024-35774,0,0,b04163e5e3aed962a8bb022fff4f15fd9953a3840984351341e879118df53ab8,2024-06-24T18:43:57.633000 CVE-2024-35776,0,0,843520135517b374d77f0b73e5d208e8aee82b3db16cc26ae6b37a47d0e96e08,2024-06-24T18:49:09.500000 -CVE-2024-35777,0,0,f154d1acc1088efd91e041269645cdeca5eaef281bbf76e5620f7396b05711f0,2024-07-09T10:15:03.223000 +CVE-2024-35777,0,1,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000 CVE-2024-35778,0,0,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000 CVE-2024-35779,0,0,08d2aa367351b69a649cc12f9302f4c59f9bed6fe925bf37e513bed83cbc3764,2024-06-24T18:40:26.157000 CVE-2024-35780,0,0,0cb83863c03783254bdbb259245f43349fceaa55402150e68b96501fc1a18c7e,2024-06-20T12:44:01.637000 @@ -252830,7 +252840,7 @@ CVE-2024-35956,0,0,55b12553a75f89f2d214b1fcd84fa80766bd8ee9d7a6cac0e7d21a623984e CVE-2024-35957,0,0,5b6371b0c19cd391a7a5e835308f5b5bb079073e043d3490afb575881e4c64eb,2024-05-20T13:00:04.957000 CVE-2024-35958,0,0,8be8284087c38f65cf08babd3b4a780856c21e62456b0a04c726a0757437fcef,2024-06-25T21:15:59.560000 CVE-2024-35959,0,0,1aef1161e36451906f546e64f8cacd36636913bd21908d9216c1a205438ce199,2024-05-20T13:00:04.957000 -CVE-2024-3596,0,0,5841e20d4189a998bb447a3e93e8ffe187f227a6648ef79bd5346751cb15631e,2024-07-09T15:15:11.527000 +CVE-2024-3596,0,1,b69270c72bc7780ce255ee2751b91648b330784bfe41a3e4639e7eb465e7c6dc,2024-07-09T18:19:14.047000 CVE-2024-35960,0,0,11d604c76d60dfaa78f70c27cc242617c170ee1b403a8338bbdc80eef71892f9,2024-07-03T02:02:30.127000 CVE-2024-35961,0,0,2504ac9445f08283dfd48dff6f73cd1bde27dcfc34a3af8b848c02cdfbc3b2d5,2024-05-20T13:00:04.957000 CVE-2024-35962,0,0,27ee2dc50d8c19cf92e1495d31ffca1c8c1cfb90509bc18e8192f2d623abe696,2024-06-25T22:15:33.823000 @@ -252907,7 +252917,7 @@ CVE-2024-36026,0,0,a2b7bbfdfc9c36c51de458fe1e65f4f5fc5d68f6240b3394c66c98a5aba6c CVE-2024-36027,0,0,04a8d28eb14b2a84cd823f108a1627ed163196ae6f3679e8018d7ce75259ea5e,2024-05-30T18:19:11.743000 CVE-2024-36028,0,0,99a65cfe5e6aeb27c26307198eb77f77f64763e0afbaeb20aafb2ecef6f915ed,2024-05-30T18:19:11.743000 CVE-2024-36029,0,0,4b393bd3d58ef667258996c8d4231ff4cc7acb00192e977ca706e530eb535f62,2024-05-30T18:19:11.743000 -CVE-2024-3603,0,0,5bea639959fb28769336c2173c44f8db16efe002f3796870611de4e2ea044645,2024-07-09T09:15:04.893000 +CVE-2024-3603,0,1,288fec124a647ea0034f383d38e57e6f0246046405799ac42b543bd46240e26b,2024-07-09T18:19:14.047000 CVE-2024-36030,0,0,00ef498a3d807c79a3c459b6828e1b94bc303f4cb2f66d73b6847b59338e7c17,2024-06-04T19:20:12.590000 CVE-2024-36031,0,0,b3d1c00a9a158e36837f51f76e121e32ecde035ed99b7ea6fbeda07ba7b3ce3e,2024-07-03T02:02:40.070000 CVE-2024-36032,0,0,2109bf212013c0ba30d278bc6b666931e282e8ca3b018462b2d195519f5dd498,2024-07-05T08:15:02.620000 @@ -252916,8 +252926,8 @@ CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1a CVE-2024-36037,0,0,b69974bc3633092c95e0c07f5aa24d13ab328cfb54a9948a0d1d9e8d060f0b0a,2024-07-03T02:02:41.210000 CVE-2024-36038,0,0,c689030949db2782a8d69ade71f9a1affc97ffaf319c773509c47cb5ee7f1cd3,2024-06-24T12:57:36.513000 CVE-2024-36039,0,0,2459d11347af42cb829e5007b01f06e3d0aed0906f508ec72619f858b8aa6d3e,2024-06-24T07:15:15.230000 -CVE-2024-3604,0,0,8cc781d138f290c12059cadc1d1e93b07e9b4f0b2aeeeef910ef77259842491b,2024-07-09T09:15:05.147000 -CVE-2024-36041,0,1,d88899430b8465bd9e7ec84eb791ba971452eec022e6c65dc6ad08436f1e4123,2024-07-09T16:22:37.687000 +CVE-2024-3604,0,1,ea7ee60528f19c53ef42184576dca884e1adecb68c727fd89d5327db5a6765b4,2024-07-09T18:19:14.047000 +CVE-2024-36041,0,0,d88899430b8465bd9e7ec84eb791ba971452eec022e6c65dc6ad08436f1e4123,2024-07-09T16:22:37.687000 CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11ac5e,2024-07-03T02:02:42.150000 CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000 CVE-2024-36048,0,0,28009f5c9c89d66914a954a3622c5cc8d7b761845f43a58d1b9db13955c9fa8c,2024-06-10T17:16:32.167000 @@ -252929,12 +252939,12 @@ CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50 CVE-2024-36054,0,0,745f3c7e954612064b0267225a8d627bc9659c4049b0e182b852fe9bfc7c38eb,2024-05-28T12:39:28.377000 CVE-2024-36055,0,0,0f986ba9c1e2ba5209d6b7a2b636885b44374f594bbb5ec4625e72f54b29eca2,2024-05-28T12:39:28.377000 CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 -CVE-2024-36059,0,1,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 +CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000 CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,eb4d689c0fd52dc71530686149db340f07354ff188ce53f7ebe9b94f9b8be928,2024-05-20T13:00:04.957000 CVE-2024-36071,0,0,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000 -CVE-2024-36072,0,1,157f1d582ebbe2db7f85438ce94b5746e14ebc22da4fa97747a1222230086687,2024-07-09T16:22:39.417000 +CVE-2024-36072,0,0,157f1d582ebbe2db7f85438ce94b5746e14ebc22da4fa97747a1222230086687,2024-07-09T16:22:39.417000 CVE-2024-36073,0,0,7f65c55d89fc8b6c5d3b4a7785da1b0dab1ec80e1ca112f4e573d11120d2dff1,2024-06-28T10:27:00.920000 CVE-2024-36074,0,0,fe26ee3452dc25406d18750fc41c47c68bcae2cd3e67efb067c3985b2651020b,2024-06-28T10:27:00.920000 CVE-2024-36075,0,0,8065b7576d1822450ebe95a948e55df1546e885b8401ad57b800c7b3eae944e8,2024-07-03T02:02:45.453000 @@ -252942,7 +252952,7 @@ CVE-2024-36076,0,0,095e5a8223ddf00346b27a38d3816d5070afb43ba53217d9f4c5235422924 CVE-2024-36077,0,0,dd4f3e87dbff21add73a266278ac055e49b2117e2fd83b28a0ab86a0527993cc,2024-07-03T02:02:47.107000 CVE-2024-36078,0,0,82760eab7701e5c572c3669adb7bca9f1d77c52b4416e7ef2f3d4f8d4f198477,2024-07-03T02:02:47.847000 CVE-2024-36079,0,0,fdb9a00040976f09fbaf93ec1c9cec0113756b033e4d68b6334fa44aebe9f8d5,2024-05-28T12:39:42.673000 -CVE-2024-3608,0,0,bfede869d0b5d09b3ebe4959b63e474a6224b98fa6eb2e8a32278eacacdfd181,2024-07-09T09:15:05.393000 +CVE-2024-3608,0,1,75396bd996e12a3ce8a9ff63abbadebbd8d739cc9bf3ff2fa94cd5f3927fb0bc,2024-07-09T18:19:14.047000 CVE-2024-36080,0,0,de5551202af1794b77e1032fd6ee35ba7df3ef2929b44077b5dc18aee0b886df,2024-05-20T13:00:04.957000 CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3712,2024-05-20T13:00:04.957000 CVE-2024-36082,0,0,ec05e6fee429e8ce759a7c1458dcc4d6897daf721318becd9b0e86af84bd511f,2024-06-07T14:56:05.647000 @@ -253217,10 +253227,10 @@ CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e52 CVE-2024-3651,0,0,8821f4cdcd404e8a3949e21d008cf13cf8482c495df0667a422ca05edf2db665,2024-07-08T15:49:22.437000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 -CVE-2024-36526,1,1,4b763e66b83bc3dff895190a088df862daf9667e96ce7727fa028f53eaa5f308,2024-07-09T17:15:19.430000 +CVE-2024-36526,0,1,1ef54497acba69e484a273933341aeb22209d47656c43c34648a5bf39e748b3e,2024-07-09T18:18:38.713000 CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000 CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000 -CVE-2024-3653,0,0,00136f401b3c6c656ef5c55de8ba1fa0fc1de80cf89a868fcfdd745793a143b9,2024-07-09T06:15:02.393000 +CVE-2024-3653,0,1,2ce001c8a2558fa4f76ef87c21e8ceeb7eaae4cf2cb26c9cd78a019c19336759,2024-07-09T18:19:14.047000 CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000 CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000 @@ -253331,7 +253341,7 @@ CVE-2024-36829,0,0,6eb0783f0584e9de50671adccbe8e7f0a1dc803b2458c66ec80ede8dad219 CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000 CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000 CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000 -CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000 +CVE-2024-36843,0,1,9015deb54483bbcbcf02bd2036f67dfa0518d8cfe31e8126a4a07c18b90651be,2024-07-09T19:15:11.767000 CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000 CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000 CVE-2024-3685,0,0,f921a0a401f8b4f7737f6fde068e597ed9cc1b4c23e79252700a3c350a96640b,2024-05-17T02:40:03.840000 @@ -253523,7 +253533,7 @@ CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44 CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000 CVE-2024-37089,0,0,546734d08a472f24d21b11f96a62ff07ba2d9777252aa2840029efb67a03052d,2024-06-24T12:57:36.513000 -CVE-2024-37090,0,0,639bb0af0e038feb557ff6a435afac36e90dd5c52f1d7b8d4de0337450222f5d,2024-07-09T10:15:03.487000 +CVE-2024-37090,0,1,c9337b1c06176564880c76e8afe6a14b4c2c49859c9816b2ce1bd95c9844bcc8,2024-07-09T18:19:14.047000 CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000 CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000 CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4d99,2024-06-26T12:44:29.693000 @@ -253531,7 +253541,7 @@ CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000 -CVE-2024-37112,0,0,c3c644f0beb8bfd9ec8cbf1629e642684fdb0be7265134e3c22c082d9098fa7a,2024-07-09T09:15:02.530000 +CVE-2024-37112,0,1,906b6afd1221b533b38819c616c93e995b341fa67c658fbfc350c9fd924bc330,2024-07-09T18:19:14.047000 CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 @@ -253568,16 +253578,16 @@ CVE-2024-37167,0,0,8e3878203632039bd5d0fde820eb6a3f65b81345351f922c359b0f8f5a698 CVE-2024-37168,0,0,30a5bfe372ab5dc3b67016944b26b77b656c73122e285b83c454024b12c1f789,2024-06-11T13:54:12.057000 CVE-2024-37169,0,0,fdaa52111ac9b7853a3eb23a839ff4b8133f3da9944b0a746205935031e65f63,2024-06-11T13:54:12.057000 CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000 -CVE-2024-37171,0,0,43234f6ea7afca38e0c30df5fcd58a6c92eeb817269542e3779c99957fab2101,2024-07-09T05:15:11.407000 -CVE-2024-37172,0,0,61fe31fe11bb97d2687f388418f92853565110d1c5ebc386a482d6529d21004b,2024-07-09T05:15:11.607000 -CVE-2024-37173,0,0,e32ab5f3b3abef3bb39e4b8844627c719261e75378e29af66feec9e8018b2306,2024-07-09T04:15:12.867000 -CVE-2024-37174,0,0,5e04972841fe6fcf4ffc0d3618dad2e0076d881eedc9522f7898db62b1757140,2024-07-09T04:15:13.127000 -CVE-2024-37175,0,0,347df71847d257d376278acd94f7b1194a3146011c837c4fd015a32842a5f2e5,2024-07-09T05:15:11.823000 +CVE-2024-37171,0,1,5c6f8a056fca417f2fb887f55d91d894ed842fded5da447563a6a16a7705788e,2024-07-09T18:19:14.047000 +CVE-2024-37172,0,1,ae8a366046d7dd48f8e68e54bb3f2ab203035ba9dc0442a354af8d976b8941df,2024-07-09T18:19:14.047000 +CVE-2024-37173,0,1,6b118194b919ff9563df9d92aeca147ad1c9240be0568a502106775661ba604b,2024-07-09T18:19:14.047000 +CVE-2024-37174,0,1,6ea6b4c5c598cffde21e9bf02e3f3c66375cf23ba059de4157bf13271d2aa46b,2024-07-09T18:19:14.047000 +CVE-2024-37175,0,1,245d36bc2ccaacb662c1de4b3302ee390456b51605e1cc1b5757076c98025e55,2024-07-09T18:19:14.047000 CVE-2024-37176,0,0,d1a35fccbf9345cac8b07991c8d6b2cc7ed3bc253ab49e3211031359d59ab44e,2024-06-11T13:54:12.057000 CVE-2024-37177,0,0,0421ff7903314276b7c17b8917958f0d79116e678cb0fb3c4c323480013ea020,2024-06-11T13:54:12.057000 CVE-2024-37178,0,0,09d4f25c1f8a3d05343115dea3f64d1198524e716da67f7a6714a382347c3c9a,2024-06-11T13:54:12.057000 CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000 -CVE-2024-37180,0,0,f4168c4817ac9ffc2a3d643f903b1ba2f9d2825c28bc6d5c333b6d0f2567d142,2024-07-09T05:15:12.033000 +CVE-2024-37180,0,1,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862f7e,2024-07-09T18:19:14.047000 CVE-2024-37182,0,0,549cc5da2b56e1ffc4f85fe12d4fc3bdb7526f84c41d2237f570cc5dd0365265,2024-06-17T12:42:04.623000 CVE-2024-37183,0,0,797ee6627defafae369247d5bda2be326b262d85b9c4ea85f3eb35804b563c70,2024-06-21T11:22:01.687000 CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0bd3,2024-07-03T18:02:57.857000 @@ -253589,8 +253599,8 @@ CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000 CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000 CVE-2024-37222,0,0,65c65c234c553e022a88bb4c0528d9ed3832ed1be7f7805c03100111f1d159f6,2024-06-20T16:07:50.417000 -CVE-2024-37224,0,0,f46b03c46e7eb6aa3454af6a36753c34452f31617274265b71f4975b7fe53fd9,2024-07-09T10:15:03.717000 -CVE-2024-37225,0,0,74ed03608a2fe989e57050e319bff5276323caacd72b140f8f8effe24a98cf26,2024-07-09T09:15:02.890000 +CVE-2024-37224,0,1,fc40d5b6b74fc1782a65f4f7c695d8fcd21ddc977f3f6d2f46d2a7ce527e9818,2024-07-09T18:19:14.047000 +CVE-2024-37225,0,1,179ee80c42794d6e0c60673ab266af3489a613462005d715fc62812821eb180b,2024-07-09T18:19:14.047000 CVE-2024-37227,0,0,4e2633b3f003b3979b327314d700d0ddc7371858460ad4db762a20ac00ff8e0c,2024-06-24T18:55:44.513000 CVE-2024-37228,0,0,e4e620c745f89628605987c2a38b0d3153deb314f842f4689d8988049cfbb358,2024-06-24T19:26:47.037000 CVE-2024-3723,0,0,21c397ab5e875f2652ba15d9001cdd8ef5c5941ff996881e18084aebeaee892e,2024-06-11T13:54:12.057000 @@ -253603,12 +253613,12 @@ CVE-2024-37247,0,0,038744b78f2f2634865ad1661e2c97961d5a301727139375431f6d0656bf9 CVE-2024-37248,0,0,99c2cd4652890a37e2628f89e3ffdbcb4a9642bb6a6f401aec3aa06f83017ab1,2024-06-27T12:47:19.847000 CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-37252,0,0,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000 -CVE-2024-37253,0,0,d66a0a87c713f3814845a07899699f09805985397c5e8ab1ba65bf593c1d5a89,2024-07-09T10:15:03.933000 -CVE-2024-37256,0,0,1fa8cee37ec3c731b22c7e9d98b54fa7abdb18f2cd959540ae280c4b56f41a66,2024-07-09T09:15:03.157000 +CVE-2024-37253,0,1,e8b3ddb7f0f7d9b21f3fd58f2a666ff68cda618f6bf43670f9bccbbcd9bf1b79,2024-07-09T18:19:14.047000 +CVE-2024-37256,0,1,7da95e9b22e085f1394d81e729de5474f21048af1b93b9ae1956737a9ee5690f,2024-07-09T18:19:14.047000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 -CVE-2024-37260,0,0,110e504e18e87ee0a4674715145b6f74e17f5c2f3f4404db3ec1f7a185bdfb74,2024-07-08T15:49:22.437000 -CVE-2024-37266,0,0,9e82a354f6703e2a3bed0c91fc67390567ae1f74936f743a2a0758167e35789b,2024-07-09T10:15:04.147000 -CVE-2024-37268,0,0,53d11a7a80dfc2eb0331088767affd54fab6fbf552bcaf205e2d930c0e33284c,2024-07-09T10:15:04.387000 +CVE-2024-37260,0,1,71ae32d07f60a869d4092274a4024739c347edcdf7f6c400a5ce16269ff56260,2024-07-09T18:56:18.260000 +CVE-2024-37266,0,1,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000 +CVE-2024-37268,0,1,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000 CVE-2024-3727,0,0,8e07517a9dca0048f3a5546e14ea5eaec2b195c195e356a5ec35a7e996ce9012,2024-07-03T17:15:04.780000 CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d24b,2024-06-13T18:35:19.777000 @@ -253639,26 +253649,26 @@ CVE-2024-37314,0,0,bbb529e96a1bf18f91583a0e4981cbc0e945b7a77e11c3672e59d0ae8b6a6 CVE-2024-37315,0,0,b4f72b26bd3caec3f1603691c50cf4aa57a502dd12dffa3210b7df6b7224a1be,2024-06-17T12:42:04.623000 CVE-2024-37316,0,0,017b03937c08e91c9a49e224018f595818adb2d3f879fb4a38ed356f1af6e657,2024-06-17T12:42:04.623000 CVE-2024-37317,0,0,ffcedf5750980013cf9c80664d42c7887dad12a9bda22bda8820f769cf631804,2024-06-17T12:42:04.623000 -CVE-2024-37318,1,1,c7a7730ddead8afde109f67bcdd3e9102766688c19b97e418ea2266fa9e157d4,2024-07-09T17:15:19.520000 -CVE-2024-37319,1,1,6f7ce9c30c4c97a4119a7b9761518c644a2341e3ba082dcd6a5a87fecf397b94,2024-07-09T17:15:19.757000 +CVE-2024-37318,0,1,bf187b276bf7194f15b8bc54dab86a9de7c3986bbe962695ea3a27d2378d8148,2024-07-09T18:18:38.713000 +CVE-2024-37319,0,1,6649e0f3c1a0b06887e991c1bcf9cc8ddafa083d1c70b5f36a9f563d5a17ab1a,2024-07-09T18:18:38.713000 CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000 -CVE-2024-37320,1,1,943664f5a7c63385020863d5cc16b454bee767df2a09c269918aa2a2f8cf08cc,2024-07-09T17:15:19.973000 -CVE-2024-37321,1,1,32c1f4ae0099b57b3050defd2ba2c8da3363dd863d5992917224906f09356b6e,2024-07-09T17:15:20.180000 -CVE-2024-37322,1,1,d661518fef6a98fb42cdc4651c8af0ba6ece2082ef5cebe82b48f00514bea4f4,2024-07-09T17:15:20.390000 -CVE-2024-37323,1,1,61666b259230de7ed628362e5b55d53520feeb18bc6aa14f27242a38de84f9a6,2024-07-09T17:15:20.603000 -CVE-2024-37324,1,1,451ae2af934f589a6bd7ca8f5b2aa8174fb0da40914e0471f38e46a8692d75a1,2024-07-09T17:15:20.797000 +CVE-2024-37320,0,1,9feeb6f4826c1214c9f1d0cd7f3196d93bfd0ed9213eb929570495df6c92b1e3,2024-07-09T18:18:38.713000 +CVE-2024-37321,0,1,1ff5e7f7eb26ba76f81233aa061bb25bf47e263f3d8af19dc56be9f7a37b8bcf,2024-07-09T18:18:38.713000 +CVE-2024-37322,0,1,3307373184a92286895dbc5332db226ea282dd248ef2937105024e03450ec03d,2024-07-09T18:18:38.713000 +CVE-2024-37323,0,1,19aeea9c84c30767167aeb00071b8c828d1829b276a4de27017afdb16c7e0ac0,2024-07-09T18:18:38.713000 +CVE-2024-37324,0,1,07d6cbedcf5c16fb377c1582dc8abc563c8978b6b8db7358aa76ccd4aa0af288,2024-07-09T18:18:38.713000 CVE-2024-37325,0,0,4bdf16d6dc352d9a71b64c0e4ef24afec0a8a1802309c44aecb9b675414655d5,2024-06-13T18:36:09.013000 -CVE-2024-37326,1,1,8aacfc6d2aab40ff652f32b70e62191693aea898412cb7f97645c35c09b5633a,2024-07-09T17:15:20.997000 -CVE-2024-37327,1,1,d4e8b61dcd8bf67cfbdf089d00dcdad37656829bef519d4cc56dcde56bd79056,2024-07-09T17:15:21.190000 -CVE-2024-37328,1,1,046262d3565687f85010c25d505507ad24129073889c60b2e32ceace2fcf672a,2024-07-09T17:15:21.387000 -CVE-2024-37329,1,1,a77672cb5807fa9a9cb8600b39687561a0b91c9cb67ffccd02d70298f18625ad,2024-07-09T17:15:21.660000 +CVE-2024-37326,0,1,55143694f84b5b19cfacdd0af54031ef1ce682b9b970a36f5d87b86f596e9565,2024-07-09T18:18:38.713000 +CVE-2024-37327,0,1,f0162d1067818d64e0b83224fbcfefa4834c9bde56adab6ab7747b2177363442,2024-07-09T18:18:38.713000 +CVE-2024-37328,0,1,46b2eff5590670d61f660e7e7fd5a5cb7c75f07b0bbbce2ac8160fc5f317fe5f,2024-07-09T18:18:38.713000 +CVE-2024-37329,0,1,f74206b1578ce6a94b65d29c2aafb5c29e89b4207171175a740a27d817d3363a,2024-07-09T18:18:38.713000 CVE-2024-3733,0,0,a4296992076c9e80c22dc80bc25acdd9a6af961376871659e0386f3449f48613,2024-04-25T13:18:13.537000 -CVE-2024-37330,1,1,5fbfe358187420c739d2af42a71831dade7d2dba59e3997d9eb2b2ea8cfb9f30,2024-07-09T17:15:21.910000 -CVE-2024-37331,1,1,e8a827c07f604eb0f766e2f098dc8ad9f59c1e48edb2caa4d2a75e5dd445d846,2024-07-09T17:15:22.113000 -CVE-2024-37332,1,1,8fc86a4048e58c31e381db64cc18ac454bfcea8b1573ce3a5ceefe53682b0d51,2024-07-09T17:15:22.313000 -CVE-2024-37333,1,1,170c3a8df49c1ab7815699ca35c7b19eadc742c79506bf7a6f2d54f8a17c3dd8,2024-07-09T17:15:22.523000 -CVE-2024-37334,1,1,b7c5ec468bac4b98c328f0d3e03b0dbf63578da2c06693c15ed1a4d5d48594de,2024-07-09T17:15:22.730000 -CVE-2024-37336,1,1,a9ffccced2210b517b66c9bb95552f365c4a4c647393999f2629561b336e176f,2024-07-09T17:15:22.927000 +CVE-2024-37330,0,1,d87061d7c53cc7053dca5807a265bed86634257e713e99b099a6df9e5f915024,2024-07-09T18:18:38.713000 +CVE-2024-37331,0,1,35b1e44541c19d4521e7d1f85328cb5fab387ffa492d3acab75b54dce9086ff0,2024-07-09T18:18:38.713000 +CVE-2024-37332,0,1,8663b1b13b0392598244b7af1b107e184bddb3a78ee7647fffe5fb35182b06fa,2024-07-09T18:18:38.713000 +CVE-2024-37333,0,1,0e3826ff0aca4081f1346dec78813b903ff921e4110cc2235c09f090bdaa6bd4,2024-07-09T18:18:38.713000 +CVE-2024-37334,0,1,7c8ba0d0faad40700d81f8e1814462d73bae476d521ff16331f3af6228fa84a6,2024-07-09T18:18:38.713000 +CVE-2024-37336,0,1,e7bc0ca364d192cfbbb10e42d3deb30fb1d15ae6eac0c5920b1af46bb5edccc6,2024-07-09T18:18:38.713000 CVE-2024-3734,0,0,b86ed30811a3326be0f0dac4d727bf041d17d1a4d696b5825133800b3e1e6da3,2024-05-02T18:00:37.360000 CVE-2024-37343,0,0,26479bb475507f8df04181d4de0dddbefaccb37e3942ed45123011cdc46ac8e8,2024-06-21T11:22:01.687000 CVE-2024-37344,0,0,ace76aff867f63dcebd20d35e0c14f95b510abb307b008be0e1d7d78b635807f,2024-06-21T11:22:01.687000 @@ -253695,23 +253705,23 @@ CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd CVE-2024-37407,0,0,ee8ce47670290c1c2b55db5b097f09876b3dd9d92be92f1e73bc28ca72e36250,2024-06-10T02:52:08.267000 CVE-2024-37408,0,0,585b814524bdbb81f700ac3933c4f0dceea6dcd8210dcf9df29d64b6ad874ed5,2024-06-14T21:15:51.160000 CVE-2024-3741,0,0,a12bddc029cd8ca7f24831417695630babe629dc15b981c15e3d0a9ffa405fdc,2024-05-28T17:15:11.327000 -CVE-2024-37410,0,0,4bef8236d66d1c6a5efdee75a8f74bfac5294413c5227545977c800b0fae0f2a,2024-07-09T11:15:13.200000 -CVE-2024-37418,0,0,4c01a60f2d265809a87ab12bc7c3fda8d1ca4e411a310c0beb9e9cedda69f4fb,2024-07-09T11:15:13.423000 -CVE-2024-37419,0,0,fb2b94296b7165089f2807f12899bf7cf772862e7af98f0fb9f5905bd5bd16b2,2024-07-09T11:15:13.640000 +CVE-2024-37410,0,1,fc065511f95a955bead4d6d27a7f63f7b1b7076830eb04c051278346bb0c782d,2024-07-09T18:19:14.047000 +CVE-2024-37418,0,1,675b821ef8240dd93d22c5ac9b8f3319c41da8d55da693dece471e9353913d05,2024-07-09T18:19:14.047000 +CVE-2024-37419,0,1,7497905030a084031f9bb8bd15796449391bccdf5e342a627e00c321a312ffd7,2024-07-09T18:19:14.047000 CVE-2024-3742,0,0,78c61e704f37a9137f7f9be10f02b0ed07c0bef31d61c3d6452a359112382921,2024-05-28T17:15:11.450000 -CVE-2024-37420,0,0,3d97f470e6d79f5520d7368b7a57feb81ac0f4cef3dfd5cdd13dfc774db7301b,2024-07-09T11:15:13.850000 -CVE-2024-37424,0,0,127d598e59f68eaff21412ce2d84b26bce26d4dd6318cb300c8d6fa87d93edc2,2024-07-09T11:15:14.060000 +CVE-2024-37420,0,1,fa4fba43610346a4c73a6f42b596dded3d6dc6de3bdef2d0e568f5534a8bec1d,2024-07-09T18:19:14.047000 +CVE-2024-37424,0,1,fb16d4de8ec78b8ec08d294a6bed2c6089434892d86f157d76124906952fff11,2024-07-09T18:19:14.047000 CVE-2024-3743,0,0,a066d49023268d129172d910e0990b3a457ebf914ca5a08a9f020fc0da48a3af,2024-05-02T18:00:37.360000 -CVE-2024-37430,0,0,9cb7f08f3dee409953b8e5b77627bfcb734ed1e7f97a6c378672d0346317554d,2024-07-09T11:15:14.263000 -CVE-2024-37437,0,0,32f0b3ae6dcf801d763b00019be3399bfcbd92a71ff4691af24cfadba017f90b,2024-07-09T11:15:14.470000 +CVE-2024-37430,0,1,f63f8a79ba000a8d3292c8fa1235cffff817858e9420c3da871f375702319449,2024-07-09T18:19:14.047000 +CVE-2024-37437,0,1,83ef1ea78c6e8ed1e0567a248a21cf468b1495feae2ba1cce072befcd95360ad,2024-07-09T18:19:14.047000 CVE-2024-3744,0,0,3408d488e8996c91d94ffcdb9d000c212f3fb5178aa8822cd0999d10712521a9,2024-06-10T16:15:16.980000 -CVE-2024-37442,0,0,f9bdffa5cd1a24efd12f83cebcc98e0adbc652e13b5871f78b3f2c766546aa12,2024-07-09T11:15:14.697000 +CVE-2024-37442,0,1,78875ce6f4ee251957afe776cc270daef543fd5a212b6acf13b07c615995ce9a,2024-07-09T18:19:14.047000 CVE-2024-3745,0,0,0c97e7d88631153724030fc4589ac35dd3957f099e7d9be0c53b9ed0e2dd38f4,2024-05-20T13:00:34.807000 -CVE-2024-37454,0,0,c31bc5c0652a4084131e2cffc6a01a2ac780303bce9b0fa8db1af54c2f0d3ceb,2024-07-09T11:15:14.923000 -CVE-2024-37455,0,0,0fe8b4cdaf186c8773ddaf48cef2a40e2246a629f63979021fb1c85e19eb5e1c,2024-07-09T11:15:15.133000 +CVE-2024-37454,0,1,5dd61dd0d84c4b3f5941735c6171883bab82a8d9b454b6d1ba19ff534234505c,2024-07-09T18:19:14.047000 +CVE-2024-37455,0,1,57b2f9feca4098778a62954cb394ad6294cd222d3c3a0a03ec9db535b59c5042,2024-07-09T18:19:14.047000 CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000 -CVE-2024-37462,0,0,5fd04b28555ed85ff203e97766e7fe119503f43388535f7b4aa43283f988af3e,2024-07-09T11:15:15.337000 -CVE-2024-37464,0,0,b12cb211dd3921fe3adaee65e794ce9efc8cfb16db3c4a3f8f81c6218fe11574,2024-07-09T12:15:13.997000 +CVE-2024-37462,0,1,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000 +CVE-2024-37464,0,1,a8eb1ab35f24c6f3c714c0be4368491137c91e896ce0e35c73d194923afd088a,2024-07-09T18:19:14.047000 CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000 CVE-2024-37471,0,0,5edd9f6c5e3d338e594ebab0d6a40248bc10bd2ea28750bc19b1ba1459171580,2024-07-05T12:55:51.367000 CVE-2024-37472,0,0,3954317423d61a9d54cf49fbab6fafec302a0c0f856949b52d29a5dcc939d84d,2024-07-05T12:55:51.367000 @@ -253719,18 +253729,18 @@ CVE-2024-37474,0,0,27892b3c50dd37af7a1a75e3d3fbcd24b0296e576855d96535eb10a6b108e CVE-2024-37476,0,0,a0f3320231f39c9c5889103930f7c304a498db0d6e09c95ec7c56af3d003c3dc,2024-07-05T12:55:51.367000 CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000 CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000 -CVE-2024-37484,0,0,6c7279ff1d91c98aed34a4e343468754b30f4f6ce048b85d915239483dec0d60,2024-07-09T12:15:14.213000 -CVE-2024-37486,0,0,a4271051a2dd472cd273708495bce55e94d319521244e5a368e7524bc62b6580,2024-07-09T09:15:03.523000 +CVE-2024-37484,0,1,50aa30aced984c16a9011fd00824ada68a5b673f01037d9f1b080caec3c6fba9,2024-07-09T18:19:14.047000 +CVE-2024-37486,0,1,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5be44,2024-07-09T18:19:14.047000 CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000 -CVE-2024-37494,0,0,e0711a6df698f0dbfd75f4fe066b9de71bd66136896a54cc2505ad3931fd4220,2024-07-09T09:15:03.903000 -CVE-2024-37497,0,0,8c71dae6160349ef75bdb91cfe3a7360546667d0cfc7c92b7262123a709b91c8,2024-07-09T12:15:14.437000 -CVE-2024-37499,0,0,a213bf2ddf8e789816d207cae8587f8c511cd37ff40e86a14a672375497ba69e,2024-07-09T12:15:14.650000 +CVE-2024-37494,0,1,b88e83b573725f4d6071fa3bac5e334c7dc8623314e237fe1108a022bee0ee27,2024-07-09T18:19:14.047000 +CVE-2024-37497,0,1,f3a028679a67965f61b937156a53d1c18994178b3cd3c35e2a4dd898dd2a4aa7,2024-07-09T18:19:14.047000 +CVE-2024-37499,0,1,f79cc5cf94609c9d5258a38082f5705921e4f313d9316f7fd282a1335ce3d3df,2024-07-09T18:19:14.047000 CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 -CVE-2024-37501,0,0,821442e8c2fb3a709456ca866cee31a5c01990d12b8e0357d10d3b9f6cfbf55e,2024-07-09T12:15:14.860000 -CVE-2024-37502,0,0,9a421eafff11bb525e1eeb8535c3e8f2239ec861bc1967ffb35a419ec855e9ff,2024-07-09T09:15:04.133000 -CVE-2024-37513,0,0,510c62d91ef21ad8ff85a032a9a6bb9debcf425207ba9f6543c0a344a0f4dd7f,2024-07-09T13:15:10.203000 +CVE-2024-37501,0,1,b78cf79ca308008e9008944af9630d58467f84a62f039c6a1e72ef46a8059faa,2024-07-09T18:19:14.047000 +CVE-2024-37502,0,1,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 +CVE-2024-37513,0,1,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 -CVE-2024-37520,0,0,85cf69dceed4bae45585b26980b25f95954135e5bd9bb024053a1b79bfd88dd7,2024-07-09T13:15:10.433000 +CVE-2024-37520,0,1,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000 CVE-2024-37528,0,0,dcc35f546d6b7f143e08b2e796afc57ba01587f3b3341db2d2f1e11d1d9405d8,2024-07-08T15:49:22.437000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 @@ -253743,7 +253753,7 @@ CVE-2024-37547,0,0,da07cdaafbcdf5f6f48dcc010bdacf6feb2c6627ede1b87455a66a3564df5 CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000 CVE-2024-37553,0,0,2c2a00ab257e5ea7ff19599b29cc2a5e0646dd67b7caab870443507e76e52a3e,2024-07-08T15:49:22.437000 CVE-2024-37554,0,0,e1a6b47d51956c437547356dbc2d3d6d948b498c5d648044ffbed144c9e5226c,2024-07-08T15:49:22.437000 -CVE-2024-37555,0,0,d26dc91a281588458ef33e7c42b4d987ac479b5e07c156fa7a8d867e039d2df6,2024-07-09T08:15:10.270000 +CVE-2024-37555,0,1,c8f3e7cd770b30d6604350e19dd27d9ae30c1b920108aed729ba94cc31ccb66a,2024-07-09T18:19:14.047000 CVE-2024-3756,0,0,9f6325e6bf8bb208b4e2ee6674c7d5cde657d33007cb72c8f23cf7232b49431b,2024-07-03T02:06:32.530000 CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3bbc8,2024-06-20T09:15:12.253000 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 @@ -253815,7 +253825,7 @@ CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000 CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000 -CVE-2024-37762,0,1,cd5f303513eb0960063d0e2c99c901a56ff1296cae29c33693c5d7fa45ee86e8,2024-07-09T16:22:43.123000 +CVE-2024-37762,0,0,cd5f303513eb0960063d0e2c99c901a56ff1296cae29c33693c5d7fa45ee86e8,2024-07-09T16:22:43.123000 CVE-2024-37763,0,0,75542f98a1a2f20544c469cfb3e348386a1de1558c9804033733b99d26509708,2024-07-02T12:09:16.907000 CVE-2024-37764,0,0,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000 CVE-2024-37765,0,0,f31f1f7818ee7f8090baf8e373c09fbd5bca9e31a6ae9c032a065c1fa2b18c1b,2024-07-02T12:09:16.907000 @@ -253852,6 +253862,7 @@ CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb31 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 +CVE-2024-37870,1,1,1260972ae63463f85ac855807b14402bc3d0b26113ff282510157f01902a4b8a,2024-07-09T19:15:11.910000 CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000 CVE-2024-37878,0,0,6ab5285f65d3836bfce4373eeb59284bc38e780244a86b2dd9df8f43f28d93d7,2024-06-13T18:36:09.010000 CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000 @@ -253881,117 +253892,117 @@ CVE-2024-37904,0,0,7359ae18b288eca288056e2ff119b59a0b9c9bbf3f0e5a23aea1f27fd550d CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000 CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000 CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000 -CVE-2024-37923,0,0,e41ab1788ea21b1e5d962b832030aee0757418d50c0be80be3aee16192c2d323,2024-07-09T08:15:10.573000 +CVE-2024-37923,0,1,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000 CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000 -CVE-2024-37934,0,0,328e1bd1447a6e65abd15a947c316a2d518b48d77392093c8fe3ebbe896629f2,2024-07-09T13:15:10.660000 +CVE-2024-37934,0,1,73bc3188674b33b5b84aa3c0e565fb6ff6ad526723a0d151d8961f661c3ae3de,2024-07-09T18:19:14.047000 CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c02738,2024-05-14T16:11:39.510000 CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000 -CVE-2024-37952,0,0,f492613c986cb904197730386c498d8cd36c47358973c164dcfa1eb7573f5279,2024-07-09T13:15:10.890000 +CVE-2024-37952,0,1,efacc21e38d6706da70765419ba1aaf970dc02db0084584d635a45f192b58b3c,2024-07-09T18:19:14.047000 CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000 -CVE-2024-37969,1,1,48acfd7d9aedfa5908479b9def083513770380162e6e3cfb0d2d7d8f5330e844,2024-07-09T17:15:23.137000 +CVE-2024-37969,0,1,d5fd9e371db3a51d8abbc13fe57cfb5a5ac5c4d14d6b6910e9b5b26f66613e1a,2024-07-09T18:18:38.713000 CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000 -CVE-2024-37970,1,1,623b298b8383be21eb07cfd8a9ce31791224a41e1c8c8789d130417d81f75ac0,2024-07-09T17:15:23.363000 -CVE-2024-37971,1,1,64527902f6f3245a1c27fbe0ac07c1090aba7ba1ca97deacbd616894c4c61550,2024-07-09T17:15:23.590000 -CVE-2024-37972,1,1,96ef6f539b0551138dd3b88efc329f418bd276f66c3c55917d46b6f2f6c92e5c,2024-07-09T17:15:23.803000 -CVE-2024-37973,1,1,7b9abeb4f3d4b0d592c31e9e571cde59a3ccf517a0de530a676a16d65928d6ce,2024-07-09T17:15:24.023000 -CVE-2024-37974,1,1,90eedcf162785f22c1ecff7973c975e466b599692ac727331e9c1d4341443885,2024-07-09T17:15:24.250000 -CVE-2024-37975,1,1,f610fb20de9649a8beb1a4c80069aa199cd56156e9992f953c84c5c5e8f5c868,2024-07-09T17:15:24.470000 -CVE-2024-37977,1,1,2409a263201fef52234fc22f6da01c05252cebdf6418e0b5f4a5e64aea5412a9,2024-07-09T17:15:24.693000 -CVE-2024-37978,1,1,a812367533e8abe15c06b86ceb3b7ffd23640b87fd6a32bde77514251ce7bccd,2024-07-09T17:15:24.910000 -CVE-2024-37981,1,1,4bbf0b67e29cac901a11e941257ae92d730857c14bc20e9fe6114435c82adf39,2024-07-09T17:15:25.113000 -CVE-2024-37984,1,1,a738a6765b04c8ba251ad770f545eedf2832270c3d7e9e2754ef9f3295eacaf5,2024-07-09T17:15:25.330000 -CVE-2024-37986,1,1,111dbdb571d5ae19ec3fc869d8f5c03f8ebd9664e1999a5b7f1f644785fdc881,2024-07-09T17:15:25.607000 -CVE-2024-37987,1,1,decab7be9c3ce9fd8e67dc0fcc25d5a4d8d115360d4b3e4795aa0ec544d239d5,2024-07-09T17:15:25.827000 -CVE-2024-37988,1,1,05056bcc47722d69537339ddda5cc557082c4594a25eacb2c528a3e795f1a057,2024-07-09T17:15:26.047000 -CVE-2024-37989,1,1,fc70cb611f50ed522f1597ca1cf082148b4cb73ae2c7f9674fd69ea9addff402,2024-07-09T17:15:26.270000 -CVE-2024-37996,0,0,6569956e1b374ca3da23bd95c716ba06ac1bd87db57d86ac307a6da394c81197,2024-07-09T12:15:15.067000 -CVE-2024-37997,0,0,afe0abd4026d02ee01c4dedbe87c48ae0324467602e27cb7331691dd186629cf,2024-07-09T12:15:15.280000 +CVE-2024-37970,0,1,5c43e35360638b2bbf52b133861b3517f8949a22cf6128b3a1e1aec30bf467b8,2024-07-09T18:18:38.713000 +CVE-2024-37971,0,1,7591ff1256b8ee8a456ad0614a146829ad716177fd2ac309a8d942ffcc5e5ea6,2024-07-09T18:18:38.713000 +CVE-2024-37972,0,1,e2f6dae8528d2cddcb1d629ecfc7f153e77bc8cf13e4c382ddf0c62d91308ced,2024-07-09T18:18:38.713000 +CVE-2024-37973,0,1,48fb591eede21dd45c184d8ed6c9d8b3211a1698a68c5fa84e7ebb0d15aa9bf4,2024-07-09T18:18:38.713000 +CVE-2024-37974,0,1,dfc3c75b51e50ce6f8088d248adddcc721c138400e8f3a51211a6df9412336b2,2024-07-09T18:18:38.713000 +CVE-2024-37975,0,1,0379e1fb3fee56719b10aafc84bc4d77924a9c2c055fdec77fc3f1884abda39c,2024-07-09T18:18:38.713000 +CVE-2024-37977,0,1,f47f8b621b5dcee65340c6657ec712f617d2fe8bf8a4c602f2b0c3cb9fa66926,2024-07-09T18:18:38.713000 +CVE-2024-37978,0,1,868ba15e50cdf25648e409e7f700f1f6ec06c7e1296005e0f1e13b9c664af6c0,2024-07-09T18:18:38.713000 +CVE-2024-37981,0,1,d0a194094cce4ea4fa26be36ad567f878363b7ab0e3a73c3ce3496dd636c3768,2024-07-09T18:18:38.713000 +CVE-2024-37984,0,1,661e877897f48deeba7f2b8906f18e3db9d8306f818f3e6d9ab1bfc048bacb9f,2024-07-09T18:18:38.713000 +CVE-2024-37986,0,1,35347a55f6fe6bfb5b12edd95fe64ac3bf27f2eb6b52d7f793c6f43d6581664d,2024-07-09T18:18:38.713000 +CVE-2024-37987,0,1,aa23196855f0aafc038d24a288ca20b3e67802fe46a356448fbefff51b5cdd24,2024-07-09T18:18:38.713000 +CVE-2024-37988,0,1,2249a5a94ff62fbd1049e849814709b898dd042c53980bc1ebb966a779e1b45f,2024-07-09T18:18:38.713000 +CVE-2024-37989,0,1,dcd9251350b8312f967ccfaf6bed908ce52042da267c0e5378c80314fb15c24a,2024-07-09T18:18:38.713000 +CVE-2024-37996,0,1,cba58d6ac90829d8d67ffd07f834ee70e887bc5c716a09a919d4b05a760695de,2024-07-09T18:19:14.047000 +CVE-2024-37997,0,1,459dadeefbbac0d82b1c0c2a892387565fe96e62452959c2d684100f700aa64e,2024-07-09T18:19:14.047000 CVE-2024-37999,0,0,2d39b716db03797e18d7479260305690f3ed6e27f89fd5f1e73a83d3c2ff359b,2024-07-08T15:49:22.437000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 -CVE-2024-38010,1,1,fd59e094c320a9c06474f6360a0463ef0e9922862fe2bfe8bb014525ae4b1ccf,2024-07-09T17:15:26.497000 -CVE-2024-38011,1,1,90e55c335b37ed99691f9412d7d08ca63e7198c72766ee495477f6aa45649592,2024-07-09T17:15:26.840000 -CVE-2024-38013,1,1,63aacf9903b1aaed34f679c11a9cbbc4e7fc96fc8709e5957206712aa2cd4e54,2024-07-09T17:15:27.060000 -CVE-2024-38015,1,1,e7e41bdb081b03ac8b655f104febacc18fa85700d0082575ec3518ba60e39913,2024-07-09T17:15:27.290000 -CVE-2024-38017,1,1,0d4c349272ca3e0bbfdea83457a007a91c67cacd09f7131147af321e955370a6,2024-07-09T17:15:27.533000 -CVE-2024-38019,1,1,f8bd31e9f9bd42b3e1f27da0d100510aa0c976bd83e9da6e8daf78a6cbfa9595,2024-07-09T17:15:27.750000 +CVE-2024-38010,0,1,3461604452db863cea0374a4db8c11a9f6d691f87cb91dd9676efa380092ec2e,2024-07-09T18:18:38.713000 +CVE-2024-38011,0,1,4f66ca002da61a786e83d959896416ce463bd4e0ee50eafec5d2c32e7dc218f1,2024-07-09T18:18:38.713000 +CVE-2024-38013,0,1,caad83a1489b74215afad4a4c8e82c0afba20eb05ecbae200d8de5cddfb63dbe,2024-07-09T18:18:38.713000 +CVE-2024-38015,0,1,e72c53e58f8294607d98ec9d5739915e2c08884717b909a6cc1b006142a8fc33,2024-07-09T18:18:38.713000 +CVE-2024-38017,0,1,73290933abbcecd5d36371e14a73a0c61df248f2b886d97acbc4fc5522ff2df9,2024-07-09T18:18:38.713000 +CVE-2024-38019,0,1,e82228040e66d2c2532ef58389cbb59007365a7bf6c6085235aca728e5a61148,2024-07-09T18:18:38.713000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000 -CVE-2024-38020,1,1,f7758c9657cdf6c3e91937a1ce527447b08faa600a78f64849c7279009427dcf,2024-07-09T17:15:28.110000 -CVE-2024-38021,1,1,a9de676302e27dcfd1d629df0472e267e6cc6e33d8af331f7697350546a9ddf5,2024-07-09T17:15:28.323000 -CVE-2024-38022,1,1,e925883f7a04ebf007e491159f3ce39b944df6f891a1b940427c678eb74ee35e,2024-07-09T17:15:28.537000 -CVE-2024-38023,1,1,725c9132fb87118a53745e4834f75bf6ab7a8ce5ce44e23ddc77ff434d9f5fe8,2024-07-09T17:15:28.760000 -CVE-2024-38024,1,1,dababd35c6b9464cc02613e115ef9b31fe9e26f6cfa04d867398d169ebf571b0,2024-07-09T17:15:28.967000 -CVE-2024-38025,1,1,233a7f50d843328902fd54d204b7c7dbb85533e6f9118fd0b986d9f008856157,2024-07-09T17:15:29.177000 -CVE-2024-38027,1,1,caaf56a1c30978440622d627495d4f5f558499682f5b3ccf8fb136f971069bd1,2024-07-09T17:15:29.400000 -CVE-2024-38028,1,1,1747b24e25b038f7ef3df7afc5fdee8f2f8a958d6d3e2c34444bab54dd3f3dcc,2024-07-09T17:15:29.627000 +CVE-2024-38020,0,1,bd7252602fb74ca11537d67660e517112b86ed47ec6e539cb60f3b6f51021a94,2024-07-09T18:18:38.713000 +CVE-2024-38021,0,1,4272adbfd7fcd9f761a08865d5bf8e0072fd2fb2720e257e8b6aa3fa42bc35df,2024-07-09T18:18:38.713000 +CVE-2024-38022,0,1,741e925f1c88410970e421ad8e0c1008c9a613060613b619d3e51dbb26055bda,2024-07-09T18:18:38.713000 +CVE-2024-38023,0,1,26aa830c0b687f2c026d2426ae46c898f634eeada2488acf5012ff575bf5f330,2024-07-09T18:18:38.713000 +CVE-2024-38024,0,1,18c866607aa343d89e10112e531316720d7d5da3994742c51add368374a58c90,2024-07-09T18:18:38.713000 +CVE-2024-38025,0,1,7048d88488be239bd60d4f45d665a9bf3894b60f6b8af6c981543898d1ef1eee,2024-07-09T18:18:38.713000 +CVE-2024-38027,0,1,19184693784df316c1c252205a61b1767784abb28e87076ef59c650293a83dc4,2024-07-09T18:18:38.713000 +CVE-2024-38028,0,1,6244bf2ac13e643ac559617b035f7f7de3a1c369ec0cc9af1c6cee2b56fd060e,2024-07-09T18:18:38.713000 CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000 -CVE-2024-38030,1,1,6f78bb1f433baa2e365b43a5d62ef0d6a6229c8fe8666d6a3ec7ad6b795fc9e5,2024-07-09T17:15:29.893000 -CVE-2024-38031,1,1,d2195d5608f53c5ec1843444447f3f0c336210e1c7575dee0c56ef6fbad199ec,2024-07-09T17:15:30.123000 -CVE-2024-38032,1,1,687c5868f3d7abcfee7956df50f90792d6753cd7ad428456e2e015bffb8b6607,2024-07-09T17:15:30.613000 -CVE-2024-38033,1,1,e0d4d5b5834c3a29b27568dbbfaf32ec3912f8fcef1033846f2c41de9619eba4,2024-07-09T17:15:31.093000 -CVE-2024-38034,1,1,fdbf4a0726a97205daeffec092af140dab1147397d5e4a84ea9db5e4f03d58a5,2024-07-09T17:15:31.423000 +CVE-2024-38030,0,1,1a97f52b107160b3a47008d670be7ca5bdf769c976acbc14485caac3fcf633bf,2024-07-09T18:18:38.713000 +CVE-2024-38031,0,1,71681eac70bf7c5ee2a8895750c94fbdfd9124e8ddb935a59cc1eecd96010030,2024-07-09T18:18:38.713000 +CVE-2024-38032,0,1,a26bcde123269ac26a12d7d2c1f8c381db0ac24f7cad93b03456a503b7e5834c,2024-07-09T18:18:38.713000 +CVE-2024-38033,0,1,7378cae7c51beff6a42105e21ad27453fa144c0cbb478f2500e4f99383c5ded6,2024-07-09T18:18:38.713000 +CVE-2024-38034,0,1,344447f0089b23d2741e7139bc99d0c1b8d2873289a68334dc31f69d9f5bae06,2024-07-09T18:18:38.713000 CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000 -CVE-2024-38041,1,1,4656fb1ba6a70d8f529ed33b95059e58d948fcb375cd35ad495b9ef3a364b70e,2024-07-09T17:15:31.807000 -CVE-2024-38043,1,1,ca2c358f1d6e335fddcf1e47df4b24640323f3e512c4067c713d8d7b372f15db,2024-07-09T17:15:32.167000 -CVE-2024-38044,1,1,9e84cf65d893f667921585fec80cd3a38b4edec22167c6a04e62fb8837a05399,2024-07-09T17:15:32.490000 -CVE-2024-38047,1,1,16881489211e7fe7d9e70f9c9718a886f5108795e814e7b9e4bd79099a285574,2024-07-09T17:15:32.853000 -CVE-2024-38048,1,1,ef3ade505ce4e9523f6b081fd1307eb30bafd0c68d62068e4836f4390e4c5949,2024-07-09T17:15:33.210000 -CVE-2024-38049,1,1,c6d1d4ad24353c6861717e492bcb2a1e776c6dd855411b657f006165e2dfb1bd,2024-07-09T17:15:33.547000 -CVE-2024-38050,1,1,3c5c23441c29dd6a9284db542bda5ab2b9b9798bc66c76ff3425187c2d126776,2024-07-09T17:15:33.927000 -CVE-2024-38051,1,1,e542b1f6e1bd61b36d2b8abb907d62a06cbff9e3f3ece19341e14b210c181972,2024-07-09T17:15:34.253000 -CVE-2024-38052,1,1,d4b6b0a8a15aabadfdb376711218a4b53d9b7465a4a1e313330dc2a3b0be4da6,2024-07-09T17:15:34.617000 -CVE-2024-38053,1,1,b43551867a915864af25fb6b0236c4b821db4c4a25bfd512c5dfaa8d4e73e892,2024-07-09T17:15:34.963000 -CVE-2024-38054,1,1,e8edea661132c2d7a1a03bd549be26981a420a9dbb2dfff914f7850e1b471082,2024-07-09T17:15:35.320000 -CVE-2024-38055,1,1,c2155107fc54c0b4cc8913572fc5feabdde539e17c6e4c987dc06462e833a43c,2024-07-09T17:15:35.750000 -CVE-2024-38056,1,1,a635f3fe8e62cacc81de16cdcb88b193eb43a6e69a6e79cfb2c8fa9662679cb0,2024-07-09T17:15:36.130000 -CVE-2024-38057,1,1,e179a6d1a96c395e16aa55df2b1df1ee9cce324d58e6816d4e08af286a57a190,2024-07-09T17:15:36.470000 -CVE-2024-38058,1,1,8a1159ee61deae2a7943caaf6a6791e8358f0cdcbec514f6673b2760c48764ec,2024-07-09T17:15:36.837000 -CVE-2024-38059,1,1,7f3261fdf2ca195f752bdd3fc13e2db91a35c2202c0667e018dd40380fac254f,2024-07-09T17:15:37.173000 +CVE-2024-38041,0,1,278c3450989c51cf2479f37ffc49c4f9d4f9281b72022afeb487126976abc0ea,2024-07-09T18:18:38.713000 +CVE-2024-38043,0,1,1f1f02448a6d149ff463e7075303e2939d2b2a8b3dfc808720639c531fe9055a,2024-07-09T18:18:38.713000 +CVE-2024-38044,0,1,d1f9d81750c439d53b92eaa1949240def931dbb738438b36d52cd96b6db1617b,2024-07-09T18:18:38.713000 +CVE-2024-38047,0,1,53807be6a9ac5cec3149561bb293b7248df99966ebd2aed18653ee47ec208b55,2024-07-09T18:18:38.713000 +CVE-2024-38048,0,1,8b45cd20a8a91124c2c04207baee0548e387a387f98834d6df45d2d88ebb45fc,2024-07-09T18:18:38.713000 +CVE-2024-38049,0,1,4ff0cb7806142ded796309f6d3d0af81109c83aed8d1ccf317af3bd243f5f7cd,2024-07-09T18:18:38.713000 +CVE-2024-38050,0,1,eb019e3613e7563befb82106692eae1214add613ea23c1c1378e98ed3de63a7a,2024-07-09T18:18:38.713000 +CVE-2024-38051,0,1,5f25a8eaf197c7cc75e6145e7764ba0e27b6d6dbed1433b4754260ee21a9980b,2024-07-09T18:18:38.713000 +CVE-2024-38052,0,1,47795cd2e7f8ddc31c17dbb26ffe3a6c76f37df19445db2ad6d9168b670301cc,2024-07-09T18:18:38.713000 +CVE-2024-38053,0,1,92fd6ee406255e5ae20b0c8541c33c66e9a9511eced23471615def432cf711bb,2024-07-09T18:18:38.713000 +CVE-2024-38054,0,1,fa8d15b4a89ce39d489cb035959f71683bf1487a03ed37c7dd3cc270b41ed650,2024-07-09T18:18:38.713000 +CVE-2024-38055,0,1,4bfb9c5eb1b17d59cc2a945ec65367275a4de1398808cf3501dbde690d2aa255,2024-07-09T18:18:38.713000 +CVE-2024-38056,0,1,d3d52d6976df2a448b88d618ed66279e310e3f40b77fb7c5edee6012b3f0a91e,2024-07-09T18:18:38.713000 +CVE-2024-38057,0,1,92a2b086499e3215cb3faaede3cc890c0b1a11336bdb7aaca69d217d07509095,2024-07-09T18:18:38.713000 +CVE-2024-38058,0,1,9afac0de1918b95c6dbe199ecf90207a0e3f8d3018e9cd0d5064ab0264c9fc59,2024-07-09T18:18:38.713000 +CVE-2024-38059,0,1,d0129026d8a1354243ee38a0ce659812f732da20fbb52961254e97028108b096,2024-07-09T18:18:38.713000 CVE-2024-3806,0,0,de873f8585a077f47d9a3aa2ddc3d8a1a22e9124cbb6f60c98787e1f14a35570,2024-05-14T16:11:39.510000 -CVE-2024-38060,1,1,f9c387ab56da3b5f8eeec89384447f40731c6bfe9b3ee051006e448fdee0efb9,2024-07-09T17:15:37.440000 -CVE-2024-38061,1,1,7010e3e7da0ea57cc683546de892f440d04f0d00b94880eee395a8e4f201e9ae,2024-07-09T17:15:37.770000 -CVE-2024-38062,1,1,82439a3bde5eed5a783f0fa05874c934536a4f83a1b21daa170f0e5cbc0517ae,2024-07-09T17:15:38.087000 -CVE-2024-38064,1,1,465d3be26a20363d9ffd41443ca5df502b30a57df98c94a1e9ccdaa4fe9dd74a,2024-07-09T17:15:38.427000 -CVE-2024-38065,1,1,5c1b273daaf0d1d27d9e380d0bbf14ba85d003caf181b2ae496873807f7e14ff,2024-07-09T17:15:38.757000 -CVE-2024-38066,1,1,dbc104df5027af514f0a602058cdcb9ead88fd86c70bb8124058f500fe74f2c8,2024-07-09T17:15:39.067000 -CVE-2024-38067,1,1,da76d94d0f0ebd3d82f27727fed1264718487c52952a9f15677a0ad6a5958b7c,2024-07-09T17:15:39.367000 -CVE-2024-38068,1,1,f986f464baefddd159c0dbef0668fd23c9c9f8593bfc2795f3cd4783c4f47a99,2024-07-09T17:15:39.690000 -CVE-2024-38069,1,1,22418fb3598ed4e3914d654e8c94cbfadacda5f740cfc10b6cd7420deb20a7d9,2024-07-09T17:15:39.990000 +CVE-2024-38060,0,1,0621e2be768127cc17d52221bd216bd787d6365d6b7ef1cfdf63cf2a87f53892,2024-07-09T18:18:38.713000 +CVE-2024-38061,0,1,22495ae4b622a515bf77d60bb4c694e225cb917853e706564c82eabe17b0a8e4,2024-07-09T18:18:38.713000 +CVE-2024-38062,0,1,302cb9bf64e71fad72d4c2f66e8891bd43e03bc209d0c0806747c6aab8c451d6,2024-07-09T18:18:38.713000 +CVE-2024-38064,0,1,dd5ff4c892d7059a5b50c695a4cf3aefa9c8ae61d639ec77f0b4f64f633af90f,2024-07-09T18:18:38.713000 +CVE-2024-38065,0,1,11724388744a90ffd8c1098e77f009f4e2a60a2be3fc84d2902546cf534484b4,2024-07-09T18:18:38.713000 +CVE-2024-38066,0,1,d2e2bbe4bc29bc31726777b0c907a6d0f18b0f414145042105f9e752c9c03df6,2024-07-09T18:18:38.713000 +CVE-2024-38067,0,1,3367c143e7ad593750445bb430ad6cf0004e94887ecaeda1685a814fedb5a565,2024-07-09T18:18:38.713000 +CVE-2024-38068,0,1,7aec38c4a9c167694ce42df8f3a9ca87f5bcb58fd50a5928f5a75f85101d95fe,2024-07-09T18:18:38.713000 +CVE-2024-38069,0,1,a0b3d0207f6ca940ad376624326ecbd373bc1c1bf12037482ef1d1a974ac49e8,2024-07-09T18:18:38.713000 CVE-2024-3807,0,0,0018248fbe5cd3ad3d19de6c834f7e1f73352b7bbd9c92aa03f6a65e0b3f3d96,2024-05-14T16:11:39.510000 -CVE-2024-38070,1,1,1f206d1b6b9fbd6af8352fef01e6991ca525ce784848961c38f24418f9c2c36e,2024-07-09T17:15:40.340000 -CVE-2024-38071,1,1,cd4456c934f7d96cecab4e805024521ba07c5b52314cd3eff57a95df117da3fb,2024-07-09T17:15:40.677000 -CVE-2024-38072,1,1,6bb2d9b336e7f4fdc828d984bceb7e8605395fae263789deb227494b2601f751,2024-07-09T17:15:41.013000 -CVE-2024-38073,1,1,e41788c42892df3fe0386382d0f884d307eda62a63dbc62f15a62080461e9d40,2024-07-09T17:15:41.363000 -CVE-2024-38074,1,1,28e4d3cf31e8fda4577a15e62f3b353e04297ecdf1068602fb9681d5df488c4f,2024-07-09T17:15:41.733000 -CVE-2024-38076,1,1,5ca713f95ff79309ff9f67cb1003d2cc1ff571f6c89618a748d7b0bb8a49a19e,2024-07-09T17:15:42.090000 -CVE-2024-38077,1,1,d998f25e1e43cc60eae8a69089eb4d6769ef2aca66afd1a8013c4c722fa1a2ca,2024-07-09T17:15:42.430000 -CVE-2024-38078,1,1,9bfb6f452075ca99efce9b715cc29d72cdb97cf283f2dcbb92fa1261c3e83d15,2024-07-09T17:15:42.770000 -CVE-2024-38079,1,1,e5743e913cdc064fde122adfeb7438b9993042eea62ae5dc816ab680869d028c,2024-07-09T17:15:43.077000 +CVE-2024-38070,0,1,6d783cba0ab00bf76f35e4bab6e84029bb887237907f5e64952558dee021d92b,2024-07-09T18:18:38.713000 +CVE-2024-38071,0,1,1010e295e6eab5b3956161ac48e0cef387aa69e7b69fb5b06a6ab369be5c6ceb,2024-07-09T18:18:38.713000 +CVE-2024-38072,0,1,86b7e18b91a90af8df2d0c013b3bb2421c7d53b207bed58b7e7387a1c2b6d703,2024-07-09T18:18:38.713000 +CVE-2024-38073,0,1,56e4d1951cb5bac2d562a0c70bccd3573098b798a15c5ce3a563445f960816ad,2024-07-09T18:18:38.713000 +CVE-2024-38074,0,1,c0a843abfb5a8b8c595f204778ac7258ce13c13886138a3eb856055572c32965,2024-07-09T18:18:38.713000 +CVE-2024-38076,0,1,88ac10e2bf634b76c002c2d4a99d1f06834c6dd8a8cbe3a68e81a51cea4c4ec3,2024-07-09T18:18:38.713000 +CVE-2024-38077,0,1,276bac41c8a9d6390bf57caa6d799abf338da198dd48b4fea6298d8488a91016,2024-07-09T18:18:38.713000 +CVE-2024-38078,0,1,0df57b472965e388b6bff9d9a3373453dfcb0667bbd787054bd46de4ef374820,2024-07-09T18:18:38.713000 +CVE-2024-38079,0,1,3da6a835645303dd6ea4ec7396c5bd777d272ebe78730b08611599dd9d8cadc6,2024-07-09T18:18:38.713000 CVE-2024-3808,0,0,39d88812c006142e5fcd1316bc5358a96100b3e812a4968772ff781eaaa6617c,2024-05-14T16:11:39.510000 -CVE-2024-38080,1,1,be14be15f1455987601ca6fa7314f823beffb5c4d6fc1ee3368f61bbee71df3e,2024-07-09T17:15:43.410000 -CVE-2024-38081,1,1,dc32c36fdcf11fa0ffd7b1ac2d0217f2571cc62ef85c2c07460bd21928e6384d,2024-07-09T17:15:43.750000 +CVE-2024-38080,0,1,0cf51b0c83e0ff75aa4a6477e0b7e122bc1e046bcbdac1f8b15fbd28d71e30d3,2024-07-09T18:18:38.713000 +CVE-2024-38081,0,1,b9330c7e774e060916883ddd31b48db87a543a1fe7cb381f2e7435e21c1c1d1a,2024-07-09T18:18:38.713000 CVE-2024-38082,0,0,bc9f32f06527a9ce5c1b3af2dd4bee3be5b0ec1019ac580769fc66f0b9304f74,2024-06-26T18:15:15.067000 CVE-2024-38083,0,0,b61c1ffe6c2964ef8e02b76eac914876419214d04e7ace88d2f1669ac6f4c07b,2024-06-26T18:15:15.170000 -CVE-2024-38085,1,1,42a6dbda05e43f8cc5135c4fd1e0a787257e58d070440a41c764f666ad3418a1,2024-07-09T17:15:44.080000 -CVE-2024-38086,1,1,a5775a66225d0c80e90f674d0562f02169ac53a7dc6bd8ac4dc7a2058c224711,2024-07-09T17:15:44.373000 -CVE-2024-38087,1,1,dadf7d929659f86e631bc1d168e01f4e2ce6a730d7b42c968ab0e856bc4dbe20,2024-07-09T17:15:44.673000 -CVE-2024-38088,1,1,4504f4817d6afcaa93958a690a3d8bf84c7517b99dd9a1870e04841ef57bf5d7,2024-07-09T17:15:44.933000 -CVE-2024-38089,1,1,d8b9dccbfb2d8a5ca7e14646682fbdab7db98289c1d3a9c508da292cc172cf98,2024-07-09T17:15:45.170000 +CVE-2024-38085,0,1,613bc41729e2540d50034b533de8a1465918e0bb243683fac4dfd7af0e36fb7d,2024-07-09T18:18:38.713000 +CVE-2024-38086,0,1,a08a596ab0ac96c771cfd054fe636f26f6ec1f15d1f3ff7eda542e3d7f7f5f63,2024-07-09T18:18:38.713000 +CVE-2024-38087,0,1,d1c57445a6a2750d20b80d47fd627cd7c3d206795fd15419f3582a4d2db4d11b,2024-07-09T18:18:38.713000 +CVE-2024-38088,0,1,7b12d5c05529a5ffc5848aeb30dba14e784661b2c7fa8f10731623c1526840b1,2024-07-09T18:18:38.713000 +CVE-2024-38089,0,1,d5c64193d1f389710f9abd25f1585b8a713804000b2c0dcf9d6625d282b511c8,2024-07-09T18:18:38.713000 CVE-2024-3809,0,0,a034925aa5fbdeb8d8f213935fba76e152f9c290a4a5d18c12398fefebad7ce4,2024-05-14T16:11:39.510000 -CVE-2024-38091,1,1,b4cf740c4fcc613c77d3fd682dc218a50820f946201d912d549317bd29a9bd32,2024-07-09T17:15:45.380000 -CVE-2024-38092,1,1,df67b5e0a8a0271cdb32e47a6b29252e0470e3b4d5041e2d790ad0a772c592ef,2024-07-09T17:15:45.633000 +CVE-2024-38091,0,1,18cbe1a51c984015b31aedde540c43ff8f7157768403dbb39c90de586b3e0884,2024-07-09T18:18:38.713000 +CVE-2024-38092,0,1,efd36a5afbece92529811b85942dfa3801f16bfc9dc04072d0a1d6de9d601119,2024-07-09T18:18:38.713000 CVE-2024-38093,0,0,7a6528d9ef9e37de49cc37136719775ad4ca6736203f4bafcb828a0b50954922,2024-06-26T18:15:15.260000 -CVE-2024-38094,1,1,04e6bb6947363f86cdd4617837b664e281a8a903d13dac35bae1ed4ef9bd94e8,2024-07-09T17:15:46.090000 -CVE-2024-38095,1,1,e65fa9a20d4ec8bca3f04d12345b7b90335a3c56bf3669545803aa02fdcb9c06,2024-07-09T17:15:46.313000 -CVE-2024-38099,1,1,614d1695e8430a06674bba9c53c6deb547a088bf8f94933a54e1fec99b7c3acd,2024-07-09T17:15:46.517000 +CVE-2024-38094,0,1,62b6b6694e1c14cfd00e8f82f74f0818214c6cf15a745efbc0ed986d5456e4ea,2024-07-09T18:18:38.713000 +CVE-2024-38095,0,1,8bd1138190fcf80de0bf2b0927bda8acdb6626614958ed77467b4401045204b8,2024-07-09T18:18:38.713000 +CVE-2024-38099,0,1,6ca4c661ebd14e29bdeb83451e0216787daa114af443715cf18712a90f80e80a,2024-07-09T18:18:38.713000 CVE-2024-3810,0,0,915db751860884c5792da450ac833c5ebf7363681c09a171e26d38502a8840c3,2024-05-20T13:00:34.807000 -CVE-2024-38100,1,1,5fe13c3bb2bc9f6fba16c2213911762ed93602644d3d642d7d90c4f54ea23647,2024-07-09T17:15:46.770000 -CVE-2024-38101,1,1,477ab2895bf8ad6632369c9fc87d4c4e803c22b2f567ea9f4188fa8e63135128,2024-07-09T17:15:46.977000 -CVE-2024-38102,1,1,bd4f14ab6ff73227cec45367ece710fc6902812e66c37da68895fcff5c2a769e,2024-07-09T17:15:47.187000 -CVE-2024-38104,1,1,4fc6a9415fd5d82195f862f6876becb2b0fdbaae6e1f2c528cc34208b60e723a,2024-07-09T17:15:47.410000 -CVE-2024-38105,1,1,cb3b0ae41cd78bd45d1421ab0b456747805fc9f0dcfa262765ed1d1315bae805,2024-07-09T17:15:47.640000 +CVE-2024-38100,0,1,8981b1a4e403b9afc0a12dba44b87a5e725493f0a2f5bae23567932c1aa14ba8,2024-07-09T18:18:38.713000 +CVE-2024-38101,0,1,46b4add241b6abd1dab5a3433d229e6b3bf01a44a668aab82a33c3467748855a,2024-07-09T18:18:38.713000 +CVE-2024-38102,0,1,27a20393ae71b07322807d57cfc710e68bb868d01e02809713415ad0785f959f,2024-07-09T18:18:38.713000 +CVE-2024-38104,0,1,71dee103fcb9bcefd6ec0001477eae38dc5588c73d740ce6c55cb85c4c19d5f1,2024-07-09T18:18:38.713000 +CVE-2024-38105,0,1,cdb9bd6ea9956614f9482fb6010690c821c1dbcd0ca3c1753b99286374c4f3bc,2024-07-09T18:18:38.713000 CVE-2024-3811,0,0,06c7e681130e5c23fc15839cbcd4895e2d61ac5545ff467d39f3bf28a1e3b8cd,2024-05-20T13:00:34.807000 -CVE-2024-38112,1,1,46fb047f82ada60db7b9ed797390e2e2ad3d706e5eadff0d8b6c614351aed1ce,2024-07-09T17:15:47.860000 +CVE-2024-38112,0,1,b6b56f1b474641e62945b4f1977f2c30851d3c6997719c5dacbfcf15f049d5b4,2024-07-09T18:18:38.713000 CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c24,2024-05-20T13:00:34.807000 CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000 CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000 @@ -254014,7 +254025,7 @@ CVE-2024-38274,0,0,695f4776bc9da0b749f4bd4e8e8830e4a621add514e667c392deb2445ea25 CVE-2024-38275,0,0,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000 CVE-2024-38276,0,0,8f400bdb3990cf115c7036c2753d2a6feedd3604e2b534641c0664514cce6946,2024-06-27T03:15:50.300000 CVE-2024-38277,0,0,9605cead31ae22d303e958d368dca6ec79ee41629f04ca89a87e1b14962ed517,2024-06-27T03:15:50.370000 -CVE-2024-38278,0,0,46cb8fe87063c0d29effa2189ae0eec44f13c1abfb6db0472353d9dc90b59fc9,2024-07-09T12:15:15.497000 +CVE-2024-38278,0,1,2d3eb79ce9aa575f28240764f5b3d8f554e84312a1a62d0b25d6d66f992ceea4,2024-07-09T18:19:14.047000 CVE-2024-38279,0,0,8e0d752edd2b7f1cef81ab1eeb42304ca3458652fd02e5f15b8a704f935f8c5e,2024-06-13T18:35:19.777000 CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000 CVE-2024-38280,0,0,bcbf7defab925fd2529b59f3634dae6b192845ba506dcf676efe40b15061269c,2024-06-13T18:35:19.777000 @@ -254039,7 +254050,7 @@ CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a CVE-2024-38330,0,0,653d6c4746fe821775fa6c90764cf2d57a108aecec5cc44075995b1cad35b0dd,2024-07-08T15:49:22.437000 CVE-2024-3834,0,0,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000 CVE-2024-38344,0,0,9ab5a9367a4478293ac2379112f78ca200a2cb316c550e5b0a6b06a397872c02,2024-07-05T12:55:51.367000 -CVE-2024-38345,0,1,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000 +CVE-2024-38345,0,0,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000 CVE-2024-38346,0,0,689d401df5aa75c70def7483ddda9de7aa5563e129adce9d2b51b58b0f05d227,2024-07-08T15:48:17.710000 CVE-2024-38347,0,0,4d613454dc1780690a10a13a7c4d0d38fa70bfa9e6afa8cdcbdd33d7a9b439c3,2024-06-20T12:44:01.637000 CVE-2024-38348,0,0,6e5ce391b6cb124e038ae8273d56ab90f89cf43a2075c68d341d5350c665dadb,2024-07-03T02:04:55.710000 @@ -254051,7 +254062,7 @@ CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405 CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9bac5b,2024-06-20T12:43:25.663000 CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000 CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000 -CVE-2024-38363,0,0,14df55a74eb9657b3b28362854ac197740920754ca89b78b0e8dd8060546302d,2024-07-09T15:15:11.043000 +CVE-2024-38363,0,1,8abbef90025de32878a73313f8630536e57c2f1508a19af0bc2beb5c62da2cef,2024-07-09T18:19:14.047000 CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000 CVE-2024-38366,0,0,c804f94bd9a9281c50163d6bd850f11de47bf9dfcd004925ce0ed31a43c4b0bc,2024-07-02T17:15:05.180000 CVE-2024-38367,0,0,d3326a47bb3d237ae822354ef25e3ecc075d6076ace31be51fee96ae9db93c06,2024-07-02T17:15:05.410000 @@ -254059,7 +254070,7 @@ CVE-2024-38368,0,0,03b9c449b31d9a7d3f598bc6d45d21df03487372325a1e752596006346b7f CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000 CVE-2024-3837,0,0,83b07e73fbcd3bdc07d74ecd9200ace8bc3f655fb5ef786e0fb5447a3f989592,2024-07-03T02:06:37.303000 CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000 -CVE-2024-38372,0,0,91bd8059412033e8001c33aac534b968b58d8c95811af77b2cd3f6bdf04cb728,2024-07-08T21:15:12.033000 +CVE-2024-38372,0,1,3d54cf49c69f5dcfca10b8ed801434d5b29c7aa6896635c0f913f2cd2b718834,2024-07-09T18:19:14.047000 CVE-2024-38373,0,0,44bd01362bd05dfdecb2d241c2e4e4fe52c2264760c405bf6f3f48fb0d969aff,2024-06-26T15:02:05.100000 CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000 CVE-2024-38375,0,0,ded65bab8580f207fa6313539998812618b08a20bbdd5d51ce7200bdf863d856,2024-06-27T12:47:19.847000 @@ -254088,7 +254099,7 @@ CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000 CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000 CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000 -CVE-2024-38453,0,1,08958525d96155b2873daad7721dd5cb57bde45d4e8e94a2b3e4a3f3b7e8c89f,2024-07-09T16:22:44.900000 +CVE-2024-38453,0,0,08958525d96155b2873daad7721dd5cb57bde45d4e8e94a2b3e4a3f3b7e8c89f,2024-07-09T16:22:44.900000 CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000 CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000 CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000 @@ -254105,7 +254116,7 @@ CVE-2024-38469,0,0,511cfa020ce0415f6c58505919037fce87bd20a70c430acbe541f3249cbfb CVE-2024-3847,0,0,95f9ad8fbf5c3c80550e0a325ff7f48c02be2f78865a75992b282f70c630bcf1,2024-07-03T02:06:43.977000 CVE-2024-38470,0,0,e532fc2610ce0ba05d395b2565b3921da00db5c8c8ee1a62b50a319ed8de746e,2024-07-03T02:05:07.477000 CVE-2024-38471,0,0,3da065067273e795c22a9430ea2650425c29da7d06ad6ab18b550114c797a95a,2024-07-08T14:18:45.747000 -CVE-2024-38472,0,1,58c9cf519f027bb399c29f941525d51dfd3472bcdf6b51d4d38d0e3dfc4a8b3c,2024-07-09T16:22:46 +CVE-2024-38472,0,0,58c9cf519f027bb399c29f941525d51dfd3472bcdf6b51d4d38d0e3dfc4a8b3c,2024-07-09T16:22:46 CVE-2024-38473,0,0,4a52332d99fe848743528bbabba861df2f74ad2accfcf888abc7220000504fe8,2024-07-02T12:09:16.907000 CVE-2024-38474,0,0,d9563f48d3829949fd43481a10c11343a9dd1b93362516af40fb11af0189d44b,2024-07-02T12:09:16.907000 CVE-2024-38475,0,0,a35882af8549de31719dfb044d0026ec782ef0f7c68b1f3c7e2c6bf51a72fff7,2024-07-08T14:18:45.973000 @@ -254124,6 +254135,7 @@ CVE-2024-38513,0,0,1368ed636d2ce5b196281db8def21fabd9a411fc039fddaf211605e85a645 CVE-2024-38514,0,0,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000 CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000 CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 +CVE-2024-38517,1,1,60c7aa320f24276b388c6f5349462f070945f3ce92a3ebfd5f7acaf6b80ec83f,2024-07-09T19:15:12.470000 CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000 CVE-2024-38519,0,0,3b366d37f50f101cb2bfcdc78fd05441af2a546f95a42ed60fc08615be04c6b0,2024-07-04T00:15:01.980000 CVE-2024-3852,0,0,23d67cc6cd9eaaffcbcd8c6df21d1387cf7355b2b4540b1c97d43e33361312ed,2024-07-03T02:06:44.987000 @@ -254278,7 +254290,7 @@ CVE-2024-3882,0,0,43bad73eafa6ac43c909cb529fe3ba674146baf41b9d3a5b4ece14285f4557 CVE-2024-3883,0,0,c0ee3c129d03d9b7803729c6b8ba3c3dbf4ee4f2b39f81dd559f9f8568fb1be9,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c391224,2024-05-02T18:00:37.360000 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 -CVE-2024-38867,0,0,c3d28880e2d2d9b82486fab0a570d5cd4f13347d0530c4fbc6aaffc7a6aa4e9d,2024-07-09T12:15:15.750000 +CVE-2024-38867,0,1,0af4e9111bae51f100e999bc3575e9e0f2f1178105282f6eb0eb905ae57e169b,2024-07-09T18:19:14.047000 CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000 CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 CVE-2024-38874,0,0,84b324545c03e3af351829556c1e9c9a1e19bfbe37e66a75476dbe17e7f3fa44,2024-06-21T11:22:01.687000 @@ -254303,6 +254315,9 @@ CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000 CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 +CVE-2024-38970,1,1,91e8208e5384541de7bb386d755fd4eb6bf4f61a3ae0e0940aabeee93bae88f6,2024-07-09T18:18:38.713000 +CVE-2024-38971,1,1,dbcb37d6e160e35ce881158758f6ae2e24bc77c4d53fd897245319338a4ba293,2024-07-09T18:18:38.713000 +CVE-2024-38972,1,1,36d7649ab8af3f70e037fbbf9397c3d88cdd83d7675f951c67bc606ac71cdef0,2024-07-09T18:18:38.713000 CVE-2024-38987,0,0,8e5543bc013d5021cfb12250ec622bf33ff663f5974b5e9efe103d174baf7a3b,2024-07-01T16:37:39.040000 CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 @@ -254312,24 +254327,24 @@ CVE-2024-38994,0,0,52e74c8e49acf40312bab2cc0a5b12a01f19b079b47741262e80278894276 CVE-2024-38996,0,0,a1527cd446e6396d926036d720f3d18c64e1e77ef3f93ca65d73a82bceb3de02,2024-07-03T02:05:31.903000 CVE-2024-38997,0,0,67cc6ee46b0f88f15a47d916defc512f0d73a6fe097801b2dbae8c76c5acc9e0,2024-07-03T02:05:32.753000 CVE-2024-38998,0,0,9282cac0cc3c8cf49c21643b99000efeea36726d969c8a628d3f29607a28583d,2024-07-03T02:05:33.543000 -CVE-2024-38999,0,1,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd240d,2024-07-09T16:22:46.603000 +CVE-2024-38999,0,0,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd240d,2024-07-09T16:22:46.603000 CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000 CVE-2024-39000,0,0,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000 CVE-2024-39001,0,0,82f6001aa2dce6119be50984c18101b4a6aacb440c096b445d257d239da9aac4,2024-07-01T16:37:39.040000 CVE-2024-39002,0,0,f730aa8ef147d70b2879c78c6f1f0ff1f81c5a139e4c9775f359b7cb8ab78f63,2024-07-01T16:37:39.040000 CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000 -CVE-2024-39008,0,1,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000 +CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000 CVE-2024-39013,0,0,7f8924a5f1b67cca0d5ab6af0e7a96c4ff89036dd75053e53c271e93cc4cf209,2024-07-01T16:37:39.040000 CVE-2024-39014,0,0,85f2582cc6d7f5ddbf77aca86106a65d54d3111a3f65f930f3405599f2535e10,2024-07-01T16:37:39.040000 CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000 CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000 CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000 -CVE-2024-39019,0,1,49f6923e7308cc94a507864c15bf4235170455a2d5e0ce49f075b9ff7427c130,2024-07-09T16:22:48.323000 -CVE-2024-39020,0,1,f3dad96d08cf85365c782d609ec6f6e7c042df2976c73457f6a2464976a50377,2024-07-09T16:22:49.137000 -CVE-2024-39021,0,1,1738b6fec91bfd00d0237390d12ea763f1a28b36e28c39eec9a265e784512e4c,2024-07-09T17:15:48.083000 +CVE-2024-39019,0,0,49f6923e7308cc94a507864c15bf4235170455a2d5e0ce49f075b9ff7427c130,2024-07-09T16:22:48.323000 +CVE-2024-39020,0,0,f3dad96d08cf85365c782d609ec6f6e7c042df2976c73457f6a2464976a50377,2024-07-09T16:22:49.137000 +CVE-2024-39021,0,0,1738b6fec91bfd00d0237390d12ea763f1a28b36e28c39eec9a265e784512e4c,2024-07-09T17:15:48.083000 CVE-2024-39022,0,0,afaf748649b1db169d83f7a69696dd09c6197d4b5b460917351e14e19d519efa,2024-07-08T15:49:22.437000 -CVE-2024-39023,0,1,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662477,2024-07-09T16:22:49.943000 +CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662477,2024-07-09T16:22:49.943000 CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 CVE-2024-39028,0,0,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 @@ -254341,7 +254356,7 @@ CVE-2024-3908,0,0,85d7a8c4b6c04a1bc64d61b9b16434d97a56cd08e916479d8cc7f65ce540b0 CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354ef,2024-06-04T19:20:26.763000 CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 -CVE-2024-39118,1,1,ea21ba4ae5f1940a9181320a3c5c52bb0a330e6fdf725c6c4cd3254f658d9435,2024-07-09T17:15:48.153000 +CVE-2024-39118,0,1,6eeafc1e9950113810b3241de143f425fb712a6056a7d9427d70bea9bc4d702e,2024-07-09T18:18:38.713000 CVE-2024-39119,0,0,1a69b24f1f94ef8540905f4cb9572420f76889d8a155c3d3a5e32d4b0cb231f3,2024-07-02T17:44:45.700000 CVE-2024-3912,0,0,40b98d6972fd8b29682fb9d5c479312d61b03f7aa0ccbcb16e7844b5a5f893f3,2024-06-17T12:42:04.623000 CVE-2024-39129,0,0,9312806d832c51933c3038527273101f0daf3190355080fae05f2347855542dc,2024-06-28T10:27:00.920000 @@ -254362,9 +254377,9 @@ CVE-2024-39158,0,0,cce9aef03924ed944acf28cea35a7f6e5bd4872826f71e46c93899a9929f6 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 -CVE-2024-39171,1,1,7826644f56ba6ae17e8bc5576e75938c5964abb1f854f3eba7c7d060ec3f782e,2024-07-09T17:15:48.367000 +CVE-2024-39171,0,1,f9e3b60744fcd49938a54605a8d8cfd6802b6b8c90ab9d021ae399691b2b9e2f,2024-07-09T18:18:38.713000 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 -CVE-2024-39178,0,1,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 +CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 @@ -254375,11 +254390,11 @@ CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000 -CVE-2024-39210,0,1,dd879bfabd368ac43fd934d5b04f30b9ae3fd52a7294467957738dbf1ac41744,2024-07-09T16:22:51.927000 +CVE-2024-39210,0,0,dd879bfabd368ac43fd934d5b04f30b9ae3fd52a7294467957738dbf1ac41744,2024-07-09T16:22:51.927000 CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed468b9,2024-07-05T12:55:51.367000 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 -CVE-2024-39220,0,1,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 -CVE-2024-39223,0,1,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000 +CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 +CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000 CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000 @@ -254410,7 +254425,7 @@ CVE-2024-39308,0,0,8dcaf739af0b20dee29866248860e3daca2a379f27a513aaf403e8e0b0c2b CVE-2024-39309,0,0,136c09ae402132cc087ad5758d406eac21c47491362259de052db9baf065bd3e,2024-07-02T12:09:16.907000 CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000 CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000 -CVE-2024-39312,0,0,90444c2e04aa3c0a9829431440363d746023d1b7d56b397cc2c8289d252e81e1,2024-07-08T17:15:11.547000 +CVE-2024-39312,0,1,04595d77ae56075623d315de5a6b6af4899584d3af2422766bf0d2b6e827521b,2024-07-09T18:19:14.047000 CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000 CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000 CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 @@ -254484,49 +254499,51 @@ CVE-2024-39483,0,0,d36581a3f952605fa4deddb55b42f749ee06fd7a8fd95b57c25fb72ba28ba CVE-2024-39484,0,0,a445c76503df3c2b08ea3e5bff9e0551e6280c35730c3d8354635c9d4c9c04c5,2024-07-08T18:01:56.137000 CVE-2024-39485,0,0,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000 CVE-2024-39486,0,0,77cff8922a497e9f5f3a2c54a76728f0d6b7e7d5f3ffc0649161a58f4b404b51,2024-07-08T15:49:22.437000 -CVE-2024-39487,0,0,846714980a97846964430a4005a2880a7332975dc9537dad41da1c0866007e2e,2024-07-09T10:15:04.597000 +CVE-2024-39487,0,1,a753ee835b7e39ba050c96e915c7182f4ab084e4115de59996f349f1dcc33193,2024-07-09T18:19:14.047000 CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f43,2024-05-14T16:11:39.510000 CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 -CVE-2024-39567,0,0,f2d2e08b54a83147c48cdbfb5e1d1fc258f6e609abd85a851f0d54348102afe7,2024-07-09T12:15:16.053000 -CVE-2024-39568,0,0,f2b83e07e0085f75df87cb2cba0a456233fa1a5f5ad0f8ebef5df05bb9e502bd,2024-07-09T12:15:16.263000 -CVE-2024-39569,0,0,1c9c02d847c4fd37bd2844ab60b19347269a36bf2641c5c459d4f054148993b7,2024-07-09T12:15:16.490000 +CVE-2024-39567,0,1,7b194844163bcf526e5adc38cee5e584dfd615ab7311f788e296e35db5f76246,2024-07-09T18:19:14.047000 +CVE-2024-39568,0,1,155da4fcd07a352c9fe4061336a48a1bfe3bd89ed7e98a66130b41e632263aa3,2024-07-09T18:19:14.047000 +CVE-2024-39569,0,1,52889f68709bb42505429361fd8cbaa37b3cfa3fede130db2e5e3c1d1167ce5b,2024-07-09T18:19:14.047000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 -CVE-2024-39570,0,0,0451e86648e30c418638b833c6b2b74bb75696deb80459f8469cce3d356f956a,2024-07-09T12:15:16.723000 -CVE-2024-39571,0,0,8b6925a36b21f28fc103bb73326a867853342fbcbbec156e97e686839cda0ebb,2024-07-09T12:15:16.953000 +CVE-2024-39570,0,1,1917d857fe98ef195235e7e1e6720880090abde68067fcfc8071e8488d94c340,2024-07-09T18:19:14.047000 +CVE-2024-39571,0,1,1f2dd2c50923d8589a1a349d2f4f9d2d7f8320b7a0892bf8fc808614b2b423eb,2024-07-09T18:19:14.047000 CVE-2024-39573,0,0,7e7eebc8f7807e5a5d00f82c0d28f5abe2d79239ae34bea5f004fd03abc17ccd,2024-07-03T02:05:50.170000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 -CVE-2024-39592,0,0,e9fbc7370198c1cbca6951990862b24e358e9ec3c2e9bd4f45cf183b473fcc73,2024-07-09T04:15:13.420000 -CVE-2024-39593,0,0,ab03db1c29c90c00f00398b8b34dd1b966b8fb91a2a61ea761d1298c478a33fd,2024-07-09T04:15:13.663000 -CVE-2024-39594,0,0,33b48254f7725103ef14f256c42af6ad5da0f009dadf2684d8d18d903acdbf27,2024-07-09T05:15:12.300000 -CVE-2024-39595,0,0,471e285f08cfbb4edf473e6fa6b72d8f521ddce3ac42dce6e5431bcd3ffc3d43,2024-07-09T05:15:12.507000 -CVE-2024-39596,0,0,0feaf9df8c3dc646766d47600878c5d7ae6de97f7b44b244e3b98f62d5af41dd,2024-07-09T05:15:12.710000 -CVE-2024-39597,0,0,36f1d3adbce1e7aa89c00d0262e3c7a8d694651600c7f20323c7a8a29ca1a0c0,2024-07-09T04:15:13.963000 -CVE-2024-39598,0,0,e8488730700596e1567b8dff879031d95da6c3679e0700a8c6ced72dcc6e8955,2024-07-09T04:15:14.860000 -CVE-2024-39599,0,0,f65d91ec3eb36b59fbb470462f3f8ed5c6e76551cc56e87fa2afdeb6b919fb07,2024-07-09T05:15:12.933000 -CVE-2024-39600,0,0,884daf42f25ca1a9a1e2d565c12782fe1a29cd522096c7120d71ea9c80e3968d,2024-07-09T05:15:13.147000 +CVE-2024-39592,0,1,45145fa21a81f93b79f5eb8802a9b54a7c92975d0d128545a55a405ca0c46034,2024-07-09T18:19:14.047000 +CVE-2024-39593,0,1,eab98f85c605da78ed2569c0241a9cd0360d98504df861c66a4071b8f33df100,2024-07-09T18:19:14.047000 +CVE-2024-39594,0,1,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000 +CVE-2024-39595,0,1,820729bb29574a4a5ce58ca78db8102a558b15359f113c8d257b2233834c1ed1,2024-07-09T18:19:14.047000 +CVE-2024-39596,0,1,3bc6901056d8fffb28ca692106293b2ca0f70ae898e05f7092bd9d2640a3c912,2024-07-09T18:19:14.047000 +CVE-2024-39597,0,1,ec5892be23d25ce1af420539be5697aceaff5925e15f8197bbe1af5fc056b626,2024-07-09T18:19:14.047000 +CVE-2024-39598,0,1,f83a7bf0b757c59666d0d48d25e10023a227b3391b984159eed2e11a978c83bf,2024-07-09T18:19:14.047000 +CVE-2024-39599,0,1,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000 +CVE-2024-39600,0,1,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000 CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa29,2024-05-15T18:35:11.453000 -CVE-2024-39675,0,0,b447c0fd7421e721e816678d487f3e6dd107fbaff423d378ed95a0ea7d029740,2024-07-09T12:15:17.180000 +CVE-2024-39675,0,1,d0af7a5b3ca0ecdc840f81a24c22054a519a9c3aba3eafc6b5ad75a5c5c09b18,2024-07-09T18:19:14.047000 CVE-2024-39677,0,0,964d42b7e6f6658ef106b3a61b4dac74f8cf60cf8f733007f303b8eb8080b02d,2024-07-08T15:49:22.437000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 +CVE-2024-39684,1,1,67d683a5e58391528d46f26ad709b2e7a4d4eee2702aaec4f946ba29d9ab38ae,2024-07-09T19:15:12.700000 CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 CVE-2024-39695,0,0,fbaaa4e185fc8d8718a1bd681584149a106333fea090ef242205e9fceffe21eb,2024-07-09T14:47:19.767000 CVE-2024-39696,0,0,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000 -CVE-2024-39697,0,0,1022420d781a15b61ade7356167792cb9ef2f28818d4fc4af4ba6e6d6b0be13f,2024-07-09T15:15:11.290000 +CVE-2024-39697,0,1,9186fda2eab5f78df936964a06e0cbab87d706d772078d108f219ea7a02555a3,2024-07-09T18:19:14.047000 +CVE-2024-39698,1,1,e08c7335111524b5914a3b5d52a4fe4d2a39e703ebef303d4ed42fa435e23450,2024-07-09T18:18:38.713000 CVE-2024-39699,0,0,711bdc17f9c229479a79abf16418d6f303c1d2fb494a38a72ece58a87030489c,2024-07-09T14:37:55.917000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 -CVE-2024-39701,0,0,adf7f607af7bcde63218b5831673cfa82fd5191f32162c70f8a999c01901bc73,2024-07-08T17:15:11.773000 +CVE-2024-39701,0,1,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8189,2024-07-09T18:19:14.047000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 @@ -254550,43 +254567,45 @@ CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986 CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000 CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000 CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000 -CVE-2024-39865,0,0,d82b6ca1c2f25eb768968aafdd052aa29e06fa7823539f1a9201ca5553d1503b,2024-07-09T12:15:17.443000 -CVE-2024-39866,0,0,6490a4e6d8de07683cbc7c58676190fa989f8ea7e2a07068ccb2eeaceecbf2ee,2024-07-09T12:15:17.683000 -CVE-2024-39867,0,0,b3eb7f6cd38fc43a21c08eb9ce28da5cc3761dd3fe4ffcf86f5c1139aa680914,2024-07-09T12:15:17.917000 -CVE-2024-39868,0,0,0104dcfdf7cc76c723a2f9663756bff1ff83fd5ab53c5c3e94b34b75b28aed9e,2024-07-09T12:15:18.157000 -CVE-2024-39869,0,0,e6ec7a2a9c057bb25b7501b298fe6a71adcc34f584a495eac1093a33c913cff2,2024-07-09T12:15:18.377000 +CVE-2024-39865,0,1,3d35e18bf1c466f2e1b40e6eb07fb13cc7c1219ab3f36ca15a495c4004236ada,2024-07-09T18:19:14.047000 +CVE-2024-39866,0,1,e37f9a8a3a3074f4eb66cb54e9c67512ec9e333fc7db38cfa88ab0b3c843114d,2024-07-09T18:19:14.047000 +CVE-2024-39867,0,1,f46e29a953641fe025f76846f97690ca88216f4d4c5f339c4cd685785523fda4,2024-07-09T18:19:14.047000 +CVE-2024-39868,0,1,2c59d5df44bf579943b164b63e02648ec5b9bd87a5b6d82c3bd8ef98148997a6,2024-07-09T18:19:14.047000 +CVE-2024-39869,0,1,f45521b029aea5ce6fd2beeb8247915d0ba488cb4493edd64a38eafacc2334cc,2024-07-09T18:19:14.047000 CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000 -CVE-2024-39870,0,0,4e5b939edc499d80c60e9d72e455b49ec7af2aeb403072e1eb8fb44ba7281ab9,2024-07-09T12:15:18.603000 -CVE-2024-39871,0,0,1a6a7927edee467a4174676791c752f7196d2ad1b381de3281fb924d76f97c56,2024-07-09T12:15:18.833000 -CVE-2024-39872,0,0,2607cc5d860500571a94e7af45d8978aea84234f0bd953bd886af522f0592b54,2024-07-09T12:15:19.070000 -CVE-2024-39873,0,0,cecef4d5be60d7872d2c49faaf257299fc914dd18e21ce76152134762cd7297c,2024-07-09T12:15:19.317000 -CVE-2024-39874,0,0,1e156686aa90a70727bab1b65d1ee38072d189759328f5ff6e09a259413b8037,2024-07-09T12:15:19.560000 -CVE-2024-39875,0,0,8fcb5ee22efe34ec846a42659d52d5f860d2fbf404c40b4b3657760024ad13ce,2024-07-09T12:15:19.803000 -CVE-2024-39876,0,0,ba607a3b37117fe1d3c5742867a2d9c230e1c0cdab818e2809d3cd53b01eab3b,2024-07-09T12:15:20.047000 +CVE-2024-39870,0,1,500b5f6a6fcea5e93cde396fae2336b562d435c924398ddbbfb41b17ae483c79,2024-07-09T18:19:14.047000 +CVE-2024-39871,0,1,8fa003df9c05fa438db5f55bb37fc28bb76e77bb98f5aa547d0266edcb03eb5d,2024-07-09T18:19:14.047000 +CVE-2024-39872,0,1,a222c37a849687f5f483f54bd84e44d1b24f0566cd8a4020b749578a4abe52cf,2024-07-09T18:19:14.047000 +CVE-2024-39873,0,1,3990e4b66f5dfb277ce5acc7a4bdbf0cac65c86fc44f5d07eae59188e80db223,2024-07-09T18:19:14.047000 +CVE-2024-39874,0,1,0c24fd05e6d421c4eae17a21b724a074d2f1d81d502faf9cbd6dda3ab4a660ea,2024-07-09T18:19:14.047000 +CVE-2024-39875,0,1,4e71206de9f4366697c347f2685da16c9ca1cf3ea852cdc88f5bb3044d8b6007,2024-07-09T18:19:14.047000 +CVE-2024-39876,0,1,169343b5c12b9a1b2d2efbf07cd5193a2e3d213649798f2964b07aa764af7f70,2024-07-09T18:19:14.047000 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000 -CVE-2024-39888,0,0,a96db08f5ab3f4a702f9b8bdcee0b073b410562ff209f0b735bf347afc6b5f75,2024-07-09T12:15:20.283000 +CVE-2024-39888,0,1,f7637ae0feee5d9d70653d284f2ffea6d3641a46c662eba72b67bcab442feb69,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 CVE-2024-39894,0,0,374900c11a12dc50ea15b6655eaae44b2fde3969c29fbbba5a961315eede48a8,2024-07-08T14:18:56.393000 -CVE-2024-39895,0,0,d5254a0cced7911d28e96b76d1170ed32174f1c3dd0d50abeab42388c0a1d905,2024-07-08T17:15:11.980000 -CVE-2024-39896,0,0,8c23b46dfb0e96bc5f98d9420bbaf941c0ac7f64cf6829211c6df4ddd8906e0d,2024-07-08T18:15:08.383000 +CVE-2024-39895,0,1,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 +CVE-2024-39896,0,1,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000 +CVE-2024-39897,1,1,3295114120fedec0da2dbf0f3628b54559386248670bc6529eaa114f1aa466a0,2024-07-09T19:15:12.953000 +CVE-2024-39899,1,1,3b77fda908c49740a604eedb684641106ba71aeea057d890da04aa08decfed0d,2024-07-09T19:15:13.160000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 -CVE-2024-39929,0,1,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000 +CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-39930,0,0,17eb00e73f46631dbd6316a3ab19a74b1e7ba74e9179cfe94efb0d39751660c6,2024-07-05T12:55:51.367000 -CVE-2024-39931,0,1,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000 +CVE-2024-39931,0,0,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000 CVE-2024-39932,0,0,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000 CVE-2024-39933,0,0,13c72a35064c61fb9ee61ba353f0f85f361d4c4f25db4328ec414ee24921b939,2024-07-05T12:55:51.367000 CVE-2024-39934,0,0,db75b4b985c877d9f527aebcde7fbafa2671883095bbdb7782b7d9d53f40af75,2024-07-08T14:18:57.977000 CVE-2024-39935,0,0,a2d51b89263bdfbcdf956035d3cd1bb233e969c6f34b441f16701e42eb0dd332,2024-07-05T12:55:51.367000 CVE-2024-39936,0,0,151737d9121a39faad5d145bce74b1ef3d7584b31944fb5416c69ce5b04a8dab,2024-07-08T16:41:50.813000 -CVE-2024-39937,0,1,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d95b,2024-07-09T16:23:00.340000 +CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d95b,2024-07-09T16:23:00.340000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 @@ -254595,6 +254614,12 @@ CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816f CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 +CVE-2024-40034,1,1,78d67fc0878192af719c7978a795f0266a63371348a0e7aa396d5fbf983c3a0b,2024-07-09T19:15:13.373000 +CVE-2024-40035,1,1,5fb709caafcde4b2b3185833d7ac50796df9191ba799bb1686dcd3c3a59c2bdb,2024-07-09T19:15:13.450000 +CVE-2024-40036,1,1,1d7848d98a623b5fda82afcbe214cbf4638c9fe5467c8d29b6f89634dd847e97,2024-07-09T19:15:13.527000 +CVE-2024-40037,1,1,3406ef6a008949c84f0b76b332bb30a3f08cd367a95cd4df08dd94fb7002b104,2024-07-09T19:15:13.600000 +CVE-2024-40038,1,1,65942ea3a59e4d92bef1453379b13d928fba789b5d2d1955e067b434559b806c,2024-07-09T19:15:13.677000 +CVE-2024-40039,1,1,47ab2d66e84898ffd29a9f7f08d83489b4de93592b04bcd622ef6d42390723c7,2024-07-09T19:15:13.750000 CVE-2024-4005,0,0,db2b7e4cfe0f4bbe30f1cbadd95b4d8d4dea02eb8785d8f487b316678c44068d,2024-06-17T12:42:04.623000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 CVE-2024-4007,0,0,f23e193a2ac303efeb52b231cdfb7f68a21ff7ce4ccf120b52f049303bd3ddaa,2024-07-01T16:37:39.040000 @@ -254635,19 +254660,19 @@ CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89a CVE-2024-4058,0,0,c4c95455d6e76cbbdb3e2ad2bd6d39a0a74b9da8ef4ac622e44ffc5e8b4fb2cc,2024-06-07T15:40:49.707000 CVE-2024-4059,0,0,f7356d83fe5fccf2c54f421bb90f2c15bd9bf33edb756392f4236a5836d7af45,2024-05-03T03:16:29.430000 CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000 -CVE-2024-40596,0,1,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 +CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 CVE-2024-40597,0,0,9253bd3e0343b7becb6fbf27eb19f59c2b782f333d3980529c893721abdb7002,2024-07-08T15:49:22.437000 -CVE-2024-40598,0,1,de25c69f35558b8aca0a1bbf15e54892da14954831f161b4abaf3c33fd743682,2024-07-09T16:45:38.957000 -CVE-2024-40599,0,1,6f062935238269a32fa9c697a10db726f8a5fa3ba7857a0b51ac28dd9670d81e,2024-07-09T16:46:25.257000 +CVE-2024-40598,0,0,de25c69f35558b8aca0a1bbf15e54892da14954831f161b4abaf3c33fd743682,2024-07-09T16:45:38.957000 +CVE-2024-40599,0,0,6f062935238269a32fa9c697a10db726f8a5fa3ba7857a0b51ac28dd9670d81e,2024-07-09T16:46:25.257000 CVE-2024-4060,0,0,c4df35b4ba03f25ce9e66ccd2a0f6342dcbc5f1e886657ca582640ee8747c7ed,2024-07-03T02:07:02.533000 -CVE-2024-40600,0,1,ed25a1d954112b6e604389e59a306c84d0a379c9bff37ca62309eb0b76afd2b8,2024-07-09T16:52:29.877000 -CVE-2024-40601,0,0,883461e92533385217aca9705c70bfcf1f5299bd2c7b6dbaa39298d49533daac,2024-07-08T15:49:22.437000 -CVE-2024-40602,0,1,e098ba8dacdfe8eb3a9f730977ff27dde5439b2cc1291eace063e7a371b52787,2024-07-09T16:36:43.890000 -CVE-2024-40603,0,1,acebad93eea1009d1e37c96020e302d2aba28627ea345e29d4043060ff8373a3,2024-07-09T16:37:50.650000 -CVE-2024-40604,0,1,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d201,2024-07-09T16:39:36.983000 -CVE-2024-40605,0,1,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000 +CVE-2024-40600,0,0,ed25a1d954112b6e604389e59a306c84d0a379c9bff37ca62309eb0b76afd2b8,2024-07-09T16:52:29.877000 +CVE-2024-40601,0,1,8d9686d08c82f6da06c1278c2ea9431451532b6f0e4629f534c3a10c29d8ed89,2024-07-09T18:21:16.520000 +CVE-2024-40602,0,0,e098ba8dacdfe8eb3a9f730977ff27dde5439b2cc1291eace063e7a371b52787,2024-07-09T16:36:43.890000 +CVE-2024-40603,0,0,acebad93eea1009d1e37c96020e302d2aba28627ea345e29d4043060ff8373a3,2024-07-09T16:37:50.650000 +CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d201,2024-07-09T16:39:36.983000 +CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000 CVE-2024-4061,0,0,731822e6f24cd811e7f06812f39ade81c9a66c6b1046f4d45903066a1f181f99,2024-05-21T12:37:59.687000 -CVE-2024-40614,0,1,f3b46175641263d533ca7f80041fcdb976250922f7137528bc5343188d13e2ac,2024-07-09T17:11:55.077000 +CVE-2024-40614,0,0,f3b46175641263d533ca7f80041fcdb976250922f7137528bc5343188d13e2ac,2024-07-09T17:11:55.077000 CVE-2024-4062,0,0,7fcbe6e50148b9b5e05d3025a893191a4aca3bb309243ec182c3df8f6e2a0587,2024-06-04T19:20:29.007000 CVE-2024-4063,0,0,10c24a204d439c4cd3340a486d9bc67fc982c548c71c2d3a385738d7e6499dc1,2024-06-04T19:20:29.120000 CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a17,2024-05-17T02:40:14.223000 @@ -254659,8 +254684,25 @@ CVE-2024-4069,0,0,f8d2f2628e60be749b9734b09218105a0396eae1a8a4c94b50114640615c82 CVE-2024-4070,0,0,611b2353a344eebf4d3d821b72a7661978c51598fabebbafad7cb3b8eb92ba73,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,1e5173381da62898dd2d89e779aa47e534c3be7a31fd5b5ef289e0ef19550704,2024-05-17T02:40:14.747000 CVE-2024-4072,0,0,784007d6b97ec8386adb736eb517146413a15dc1e1dcfd437022813999836276,2024-05-17T02:40:14.847000 +CVE-2024-40726,1,1,7b8d9ad14b826eee97f145cc79dee6a9a9d3a21064dc0cc4b77be29e5a981941,2024-07-09T18:18:38.713000 +CVE-2024-40727,1,1,818d2f51660885bd18aff29ca21157f2219d8b7b9085f7f52a3bf402931ae009,2024-07-09T18:18:38.713000 +CVE-2024-40728,1,1,94180007f72aa82b9c1c5c0af4ecd49d1e13cd3724963bec581fbda8e85677d0,2024-07-09T18:18:38.713000 +CVE-2024-40729,1,1,063c5817d63e0834b48fe3caaac0dbf79284745cf02586e9728d1979d495c3ed,2024-07-09T18:18:38.713000 CVE-2024-4073,0,0,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000 +CVE-2024-40730,1,1,74c161a7fc27e8c857ebc65680de46534b5505713e3b6c653daa63e2357a27bc,2024-07-09T18:18:38.713000 +CVE-2024-40731,1,1,fcc2c1d921cf19ce74a1a3602475129958aef3b3ed73168b13b1a9abc71e12c2,2024-07-09T18:18:38.713000 +CVE-2024-40732,1,1,47f72568d80b19033996205a11ed5c2fea3d0cef1a548bc65585fc03ac0eb3de,2024-07-09T18:18:38.713000 +CVE-2024-40733,1,1,f96c5356bfff8bd72b53a7113913063c4463abd3853eb585eca95dda0317266d,2024-07-09T18:18:38.713000 +CVE-2024-40734,1,1,d21a5537d229ad91b7c48b55df1bc28be01fb583263cf195a7b3b441c7404c1b,2024-07-09T18:18:38.713000 +CVE-2024-40735,1,1,7cc8cdb1f3f697e27ae02a0eb6bb715fd7081c4699c178e63859c6ec0095b3b5,2024-07-09T18:18:38.713000 +CVE-2024-40736,1,1,9375b139d0da8860e5c35c233ddae6610b6eb9225dd9af6ac5da79e89de58c70,2024-07-09T18:18:38.713000 +CVE-2024-40737,1,1,fad79c4fa746bf78feb9c70300935a60e40ffbf4385f0aa28542e6b38d823343,2024-07-09T18:18:38.713000 +CVE-2024-40738,1,1,05c7005a606a60a18125d88ea20a2a1e52136cb4319c74922b6bccbc7c18b172,2024-07-09T18:18:38.713000 +CVE-2024-40739,1,1,c9b66976a87ce06993012ac3ed6817d81e267957abbf42687a0d7fed5e230ede,2024-07-09T18:18:38.713000 CVE-2024-4074,0,0,0eb3d84ea134f52e33abc34cb068e49511715452b56aeac28482d1d153123edb,2024-05-17T02:40:15.077000 +CVE-2024-40740,1,1,8171d0eb76b9366f12d936b1b1e59b64736c9a498bee2b9da5ff79c1d1f0e1cf,2024-07-09T18:18:38.713000 +CVE-2024-40741,1,1,1603e2048920d150de22029e89f2635a052428b429299ebf224cdfdd53ddfe11,2024-07-09T18:18:38.713000 +CVE-2024-40742,1,1,a8b8d5c33b2c998a7feb9c65f1249eb373025d409533e4038dd2e3c95966b52b,2024-07-09T18:18:38.713000 CVE-2024-4075,0,0,61cfb92eb2dc2fb6e0ff8370e47bd10bfd7f8ca1c4517b0742f92f6865b710f5,2024-05-17T02:40:15.170000 CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000 CVE-2024-4078,0,0,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000 @@ -254677,8 +254719,8 @@ CVE-2024-4094,0,0,b33ee059f8f8bd075d69b27868bc400620c6f43b00a28de902f166c8066c8e CVE-2024-4095,0,0,31c469f286897b03d948d4fae3cbc92250d27af63fa8e1eb75ef9d0aeba13389,2024-06-17T12:42:04.623000 CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000 CVE-2024-4098,0,0,a3e4777d420e1b3bcafda1cf3d039c925611c1ff1c0ae02e65a01fb1638060ec,2024-06-20T12:43:25.663000 -CVE-2024-4100,0,0,bb397baeb9231fe7d420a7620ef8b0e9814594a4f84ffdbedaf298fd7d298a82,2024-07-09T09:15:05.610000 -CVE-2024-4102,0,0,18069fe22f44f8edaa6cdccdf80cb02f2c959becdbad36a58f641fe6e45c222c,2024-07-09T09:15:05.820000 +CVE-2024-4100,0,1,7f59e9bc55c06404ac377b1145b413dcdbe8a5d2f3074db367eedbc1e2d39377,2024-07-09T18:19:14.047000 +CVE-2024-4102,0,1,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000 CVE-2024-4105,0,0,d169491ce182673a92c722eeae29d8822821ffafecdac5ff838fdeb75facabe0,2024-06-26T12:44:29.693000 @@ -254938,7 +254980,7 @@ CVE-2024-4409,0,0,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba208 CVE-2024-4411,0,0,c7fa179581fd2f838a938c9431cc636dd9fa2af2bec9103de58ade770f105c65,2024-05-14T16:11:39.510000 CVE-2024-4413,0,0,cca9f27cd31d87a0c2b601e673b97ef7118798e076ad06575846010a4eaaeef8,2024-05-14T16:11:39.510000 CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d8642e,2024-05-14T16:11:39.510000 -CVE-2024-4418,0,1,cd809a1efff081aff19ec89afda717628d13747b883363303c2104ea2c5b09bf,2024-07-09T17:15:48.507000 +CVE-2024-4418,0,0,cd809a1efff081aff19ec89afda717628d13747b883363303c2104ea2c5b09bf,2024-07-09T17:15:48.507000 CVE-2024-4419,0,0,e2d8f545d71f8d9558ae0290474349668dafdd9730a778cdbbf911c6b4cf5157,2024-05-29T13:02:09.280000 CVE-2024-4420,0,0,9b75921df8e16106b48e4c0d4f1fc07ba699b6ee751657d557cf95a2815ddc11,2024-05-21T12:37:59.687000 CVE-2024-4422,0,0,033ffa151e9f7c26ec50c74ca266b6c48fb375132593b1334657790301503e16,2024-05-30T13:15:41.297000 @@ -254981,7 +255023,7 @@ CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93b CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000 -CVE-2024-4467,0,1,d8044c3e713a1ac6fa030ccfe77596bb1fac317f818e280771821f60ae85da2f,2024-07-09T17:15:48.647000 +CVE-2024-4467,0,0,d8044c3e713a1ac6fa030ccfe77596bb1fac317f818e280771821f60ae85da2f,2024-07-09T17:15:48.647000 CVE-2024-4468,0,0,0ca1519b3786abed41420557bdcc900f05c07970f7b2d2d6a490ebaf1139dd06,2024-06-10T02:52:08.267000 CVE-2024-4469,0,0,38345c865c5feb52902e530671fff3d9d47caec782b7e2a3a7d5d275ffe98f44,2024-05-31T13:01:46.727000 CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8d0,2024-05-21T12:37:59.687000 @@ -255157,7 +255199,7 @@ CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d93150 CVE-2024-4663,0,0,ac32c04a2cae0071224eeefc80f9a000b8618e2f1af1abc8eb33d3a9321c7d70,2024-06-20T12:44:01.637000 CVE-2024-4664,0,0,4d4aeec2b9d4ae73905aa066e928be5011f1ff91cc6ef5979d75af441c67cdbb,2024-06-28T13:28:06.347000 CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000 -CVE-2024-4667,0,0,75e1dc16514bffbc93dda5a13d1fe5934ce31554cffa550069cabbcf17eb51c4,2024-07-09T05:15:13.353000 +CVE-2024-4667,0,1,7322872ce67d0516daa1879b5081888f034f8da24e8d2497370a4d9a15117afe,2024-07-09T18:19:14.047000 CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000 CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000 CVE-2024-4670,0,0,438b57b9006ea70a278767dc5849ca5e16eeaf7f43c9f1acf2c1dcf72f3e2983,2024-05-15T16:40:19.330000 @@ -255322,10 +255364,10 @@ CVE-2024-4857,0,0,23edc16ac7d8115e8f5dde6cd82a4022bcfda577b01ff7d148fca6e240fbd4 CVE-2024-4858,0,0,7e6f62031377207832745d7baec775cb8f5592ecc9e1490c12da872c1b62dd11,2024-05-28T12:39:42.673000 CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078a2,2024-05-14T19:17:55.627000 CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000 -CVE-2024-4862,0,0,8c8ede90f915e0104af59fda19f9bd03259e7ae31a7b8576f92dc5dd7bad5ff2,2024-07-09T11:15:15.537000 +CVE-2024-4862,0,1,edcbe7924a96735f669863aa954e0b80b2f2f909fa86acc0b68d2b031ff4d4fc,2024-07-09T18:19:14.047000 CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000 -CVE-2024-4868,0,0,444b695c0f87a0c8f279a48afc7ef0358c08079ccccdea8c82c8125a7f3b47ff,2024-07-09T09:15:06.083000 +CVE-2024-4868,0,1,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,af51c1eee226c4cbb50e264de1c7a9cc126d126278458819152cafca85d017ce,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000 CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000 @@ -255334,7 +255376,7 @@ CVE-2024-4874,0,0,e489f4227689f3d8a28a1c171b72c6312c838f037435967f317d135bb1153e CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000 CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000 -CVE-2024-4882,0,0,767bfe4d29ae8fd8fbff70452f7ebb0de590841633d23eaeddca4b9374bf3559,2024-07-08T18:15:08.960000 +CVE-2024-4882,0,1,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 CVE-2024-4883,0,0,4968eaa5ac5e1ee17a980c68456ded7b931eebe67d4a414b20bc214305c03a05,2024-06-26T12:44:29.693000 CVE-2024-4884,0,0,a65d7c966234cc9adc7a1e341a20fb8739e51ac3dffe18ddce8072a3b2cde893,2024-06-26T12:44:29.693000 CVE-2024-4885,0,0,22d6963cd58c65e49df25eb28a77834d6672add7d9ec062caa1520eac011ea2d,2024-06-26T12:44:29.693000 @@ -255393,7 +255435,7 @@ CVE-2024-4940,0,0,cb78cb49a43bd348a99dcd2f7e1d39ee831dc08e65c1988e89651f86623130 CVE-2024-4941,0,0,04ed79d9b1e3032260e31cb6cd2ea8a25db6821440182f4cb50592b145bee1e2,2024-06-07T14:56:05.647000 CVE-2024-4942,0,0,157240698edb46a5deca9943c90e89d5c268795c03f1dadbb4d2f6e28d77068b,2024-06-06T14:17:35.017000 CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000 -CVE-2024-4944,0,0,a57995eb1ec9aa01add18e609846b77b990bf63b23a0d545f93722ff35d463f3,2024-07-09T03:15:02.270000 +CVE-2024-4944,0,1,5801d2e93defc235e551a88b809eabf37abb52f4967b3b90cbbede8e8e96ce2d,2024-07-09T18:19:14.047000 CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000 CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000 CVE-2024-4947,0,0,8b22fa92c86c832263b0660c6b596a76b1c7e8c155bae82cd88218c6326792e3,2024-07-03T02:08:19.620000 @@ -255738,7 +255780,7 @@ CVE-2024-5384,0,0,fc8a760c5f8c6533d32783fcf44bb063e589b4e165b4e3e16391c3aeb9ec5e CVE-2024-5385,0,0,bc3c0d01b2051e708e659a5c3590b7dd8cb9dd588e93f64ca3944fc804f9c929,2024-05-28T12:39:28.377000 CVE-2024-5387,0,0,857b2af9507e1fb781392f9f45599eb9ea380f1e8b91dd3c69ea7be187de1f2a,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,0c90149987e278137050d2b65080c43dd31aa72e74992bde244a30e0d49fbf46,2024-06-03T19:15:09.557000 -CVE-2024-5389,0,0,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000 +CVE-2024-5389,0,1,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000 CVE-2024-5390,0,0,7bbbc0fbbf0080c37ea508796076f5055d10a83119ccd7fea3223bbf180b1d73,2024-06-04T19:21:08.020000 CVE-2024-5391,0,0,00f61420375c40b8d29b33273a9abb170480b355b8f71230d76cd6238a9db4ff,2024-06-07T20:15:12.687000 CVE-2024-5392,0,0,f7219b2013d34cef28a688dbd5b89c3b8013dcb24b8103dca8d259a586db6696,2024-06-04T19:21:08.117000 @@ -255781,7 +255823,7 @@ CVE-2024-5436,0,0,512ff808a53596bd19353e26c03602bd4b39921efe131952ebcd76460c505f CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000 CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2e0,2024-06-11T18:26:45.147000 CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 -CVE-2024-5441,0,0,251f0afd754d716d1a8af550b05c5cb9144fb9354d80a002ae082a78ddc937d6,2024-07-09T06:15:02.710000 +CVE-2024-5441,0,1,a7bb50aeb84e17ae0f6968b8ffc04aee2cb8a84b24c26594cbc0250db6319333,2024-07-09T18:19:14.047000 CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 @@ -255790,8 +255832,8 @@ CVE-2024-5451,0,0,0dc9e04d41f05345ae465cb541cb585eb35309652e769d3d8446d539c07ab3 CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000 CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e45496,2024-06-11T17:34:52.263000 CVE-2024-5455,0,0,fba0854666bb0b703a1a17496073d4cacfc80d7dfcf08ea3fd5bf7812a480359,2024-06-21T11:22:01.687000 -CVE-2024-5456,0,0,5a3faa2087fc5377dbc0fdca87c35769f016e7c8d965095585cec58470f2e4fa,2024-07-09T09:15:06.310000 -CVE-2024-5457,0,0,94e73b09353b910e6fc95967db64cdcb22e43b08eb84e475ae5fc091f653bfb4,2024-07-09T09:15:06.537000 +CVE-2024-5456,0,1,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000 +CVE-2024-5457,0,1,75bac1230a47e6c9074b220a560afebe92236c277c93a11ddb515af23440341d,2024-07-09T18:19:14.047000 CVE-2024-5458,0,0,9de49bd96b675511c7046065b94648120f7be327e28ebfffc7c76c5b629abe0a,2024-06-18T10:15:10.870000 CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000 CVE-2024-5460,0,0,85cda1c649a5547711ec36cd06d4f4f117811e9abf4f2bc54500bcb409f8f46a,2024-06-26T12:44:29.693000 @@ -255803,14 +255845,14 @@ CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 -CVE-2024-5479,0,0,ea9ff4e581bcc744e3da1cd91329401f87ee4866a8c844091d5ff60b1776b499,2024-07-09T09:15:06.743000 +CVE-2024-5479,0,1,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000 CVE-2024-5480,0,0,0c96379cb76c4f8b6d9852cdcc0f60ebab5e5f97f64e4439ef99fbfb3e3714ee,2024-06-07T14:56:05.647000 CVE-2024-5481,0,0,7e1e4455e255ae80e6041eac91512213cb57b2091c06ce10c4272331eb1d58af,2024-06-11T18:00:09.740000 CVE-2024-5482,0,0,deb4cff32cf3f87f89ff2e26ffd7a2390ad03b8acd8adef3ed5769f2b5cc7acd,2024-06-07T14:56:05.647000 CVE-2024-5483,0,0,50ef873fd9ba2b134eb7743380749d7bf41a18a6183eddc44371799e9b77b44b,2024-06-11T17:19:17.143000 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 -CVE-2024-5488,0,0,a528e6d967070d2f06a0391e653ecaf867bf5dd1f35152761b807d89ac790c50,2024-07-09T06:15:03.030000 +CVE-2024-5488,0,1,36664283baf396592c4e35eea335f5722cbf42bf1f5665184ae35a27e595d9e7,2024-07-09T18:19:14.047000 CVE-2024-5489,0,0,9bb79263edce390c6997c8d9f9fe7d295077e49147dbdcc1c480d08892e3d2f5,2024-06-11T18:15:01.617000 CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 CVE-2024-5494,0,0,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc903d,2024-07-03T02:08:59.420000 @@ -255854,7 +255896,7 @@ CVE-2024-5544,0,0,dc180b504fcb3a2003d6a08111fbd0a7a95f9d21df8e253c1af1716f464343 CVE-2024-5545,0,0,9270f54f7803e859f3c51cd9a03c613d31e2403f79820ead3f02bc3b56a4bf36,2024-07-05T15:12:08.467000 CVE-2024-5547,0,0,10fc933ab96f74e48222460cfee3e0b1d295bbaa26e68f34704c5127d22daf4a,2024-06-27T19:25:12.067000 CVE-2024-5548,0,0,0dab8d0a6f7f4b5d3115df8861f1ab0c0c70d1308be14527ce7ee2ffa61fade4,2024-06-27T19:25:12.067000 -CVE-2024-5549,0,0,bf37298d7fdeb39824ffb32e43c6adca372db50cacb1f80a1bed184a37e51d88,2024-07-09T00:15:02.050000 +CVE-2024-5549,0,1,8a417ee66a71abc76bfae5acb49d7feca85c7d8e54f3f159a82d5e97cedb3814,2024-07-09T18:19:14.047000 CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000 CVE-2024-5551,0,0,fe2ff56c261c11c34cfc92fd4dff768d263978728e8caa50b89ded66a68c1f4c,2024-06-17T12:42:04.623000 CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000 @@ -255865,8 +255907,8 @@ CVE-2024-5559,0,0,2783b17045adc6e83e5bf6acfe749e5c6489b786d017eb582b973704c839f4 CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e1f,2024-06-13T18:36:09.010000 CVE-2024-5564,0,0,9795ccf7f64c945419f550534828bd8bef2f36c164c7b95941f181710cd7c39c,2024-06-28T19:15:07.147000 CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000 -CVE-2024-5569,0,0,ac110bbf906dcc167f158cf33c51b4e9d88846b11b248c4bbd05584d7c26ee60,2024-07-09T00:15:02.320000 -CVE-2024-5570,0,1,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec404d,2024-07-09T16:23:05.823000 +CVE-2024-5569,0,1,b9fd3bed59b5f668c54b0264622201b8600e789b08e0f56eae05ce6b6e8c76ce,2024-07-09T18:19:14.047000 +CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec404d,2024-07-09T16:23:05.823000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5573,0,0,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000 CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000 @@ -255881,7 +255923,7 @@ CVE-2024-5596,0,0,c69cbcadf0a7f1e5940d842c2c9e90907cbda728581a745e7acd494576e03c CVE-2024-5597,0,0,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000 CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c1c,2024-07-01T12:37:24.220000 CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 -CVE-2024-5600,0,0,37a5e2e2ebbc91b377b493e8a8b1decdc7de4f468c53732dd7ff33465c9c679b,2024-07-09T09:15:06.960000 +CVE-2024-5600,0,1,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000 @@ -255893,10 +255935,10 @@ CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144 CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000 CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000 -CVE-2024-5631,0,0,759be0480f6c48771e17ceae51da6b6b7ebf895d4603f64d990623f1aa4b8098,2024-07-09T11:15:15.740000 -CVE-2024-5632,0,0,3e6655ce449c0d5f999a3642086611968aac45d5486dd23c30c81888de07f4f1,2024-07-09T11:15:16.033000 -CVE-2024-5633,0,0,f7daf67f6d55f26e2305a6031b4436bfd5aa862cc6bc1747d84ce9334da8c116,2024-07-09T15:15:11.933000 -CVE-2024-5634,0,0,c0aeb9c0b58c6de949fa900cefc8776775995839ffe2bc2805676a9cb6264736,2024-07-09T11:15:16.283000 +CVE-2024-5631,0,1,9b30c482b223eedca531f8ca306540131b53fcaebf66fca4a64e10facf0294ea,2024-07-09T18:19:14.047000 +CVE-2024-5632,0,1,86db8cfa39f80b2d69d01942d4834b569ff68095e456ea886bd99cc14c03c15d,2024-07-09T18:19:14.047000 +CVE-2024-5633,0,1,170bfadc0f2c2c5a9d793826d3ecd8b6db1b109076f41bde8833e3f86a8f0001,2024-07-09T18:19:14.047000 +CVE-2024-5634,0,1,f6be7181d17ca9e93dddabb7c966ab031aff5dd2d898fb7f10334c37e6eaf621,2024-07-09T18:19:14.047000 CVE-2024-5635,0,0,2463dd00def60296c968660a2ba7a3c25845ea097c4cd305a7e3f2bd55658946,2024-06-11T16:47:04.413000 CVE-2024-5636,0,0,82666e4630526d7fc8211dab0f89e7e17d4e982c91e038f44b209ae67bb471f3,2024-06-11T17:23:29.670000 CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3dd,2024-06-11T18:31:54.787000 @@ -255907,10 +255949,10 @@ CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424 CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000 CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000 -CVE-2024-5648,0,0,ae535f73ff66d72a05484c6b8c5dcf03fe8032bbcd00516889dbfb615c8aaa78,2024-07-09T09:15:07.180000 +CVE-2024-5648,0,1,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000 CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a0888246,2024-06-20T12:44:01.637000 CVE-2024-5650,0,0,65f855892c82055621a01afe5dfbac2eeb37ab3d50eb12f09dc0d9a40779b9ee,2024-06-17T12:42:04.623000 -CVE-2024-5652,1,1,01b08d567a8c6cc53082c5e64faaa496b5cda04794ffe88afda49b2f57317f7e,2024-07-09T17:15:48.770000 +CVE-2024-5652,0,1,80dad89d286607dd5f7ed54081e85c0062602ac2ffeb00126a333462e61e9be0,2024-07-09T18:18:38.713000 CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 CVE-2024-5654,0,0,e22a0b433d38e113ff7c2fe935a2ac4a2eac96ee27b605312aa4a4c8d50d69a0,2024-06-10T02:52:08.267000 CVE-2024-5655,0,0,16e9b1f63d749b21100036f5c9070a5ffe6aef567bd66a512cb553f6f989c7f6,2024-06-28T13:16:40.613000 @@ -255923,7 +255965,7 @@ CVE-2024-5662,0,0,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 -CVE-2024-5669,0,0,8935127538580e1e1b69294d9154e457fdc39a82d5344399eba3bcfc2df798b8,2024-07-09T09:15:07.430000 +CVE-2024-5669,0,1,ddd7772a6277d903bcf1d89da44667af6e9a3df4fd3440e71ca75c5d1aad7a37,2024-07-09T18:19:14.047000 CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000 CVE-2024-5672,0,0,ad5d2d4701d4742943be26fd8263f21d3fc9e558b462ac12f17b995fbc4b2ee2,2024-07-05T12:55:51.367000 CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000 @@ -255950,7 +255992,7 @@ CVE-2024-5699,0,0,d1e1ab6a164c3c763187b9b9eaa5ede2a373113d6efcf901de284e7d644c77 CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000 CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8ce,2024-06-11T13:54:12.057000 CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000 -CVE-2024-5704,0,0,2c4f669725f500bfb57ce0f756cecd37c95f4731e689cbb85a916f992c8be408,2024-07-09T09:15:07.640000 +CVE-2024-5704,0,1,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5711,0,0,36900df12a60df985efa67ab5ec7170d3f5b9e7d88be290fdaf1be32dc6cea47,2024-07-08T15:49:22.437000 CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 @@ -255958,7 +256000,7 @@ CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 CVE-2024-5728,0,0,970711b5fa2959720f2da02dc0abb41a56789d3063753f984448aaa0fb048438,2024-07-08T14:19:16.400000 -CVE-2024-5729,0,1,2cb3c0c4f7572d66f177de4f59f0854bd3c3465f93305722a9a63856d9162f80,2024-07-09T16:23:06.837000 +CVE-2024-5729,0,0,2cb3c0c4f7572d66f177de4f59f0854bd3c3465f93305722a9a63856d9162f80,2024-07-09T16:23:06.837000 CVE-2024-5730,0,0,b1e3b523ff3fe033a4627e600289f9d47a0ec4c88ed24f5361108bdf9adc4b02,2024-07-03T02:09:14.303000 CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e02,2024-06-17T12:42:04.623000 CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 @@ -255982,7 +256024,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000 -CVE-2024-5767,0,1,946a7a6edb6231f843cc8c36568eec07c01ffe4bb17f732fe05d02ccf6a0e4bc,2024-07-09T16:23:07.280000 +CVE-2024-5767,0,0,946a7a6edb6231f843cc8c36568eec07c01ffe4bb17f732fe05d02ccf6a0e4bc,2024-07-09T16:23:07.280000 CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000 CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000 CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000 @@ -256004,13 +256046,13 @@ CVE-2024-5787,0,0,7676e1b0ab184e8654efc91f56a8d84cd9d6d539bf642c0a4ff7f743a62b9d CVE-2024-5788,0,0,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000 CVE-2024-5790,0,0,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000 CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000 -CVE-2024-5793,0,0,af5a5b6481201cf3530d669d7483e5b5d72a03324906b65441139d3ef7b4ea9b,2024-07-09T02:15:10.240000 +CVE-2024-5793,0,1,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000 CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000 -CVE-2024-5802,0,0,acfdf24b32d7a7c321880500e70e9c78bd671bb4c0e5bb05b30bedc55f268c36,2024-07-09T06:15:03.117000 +CVE-2024-5802,0,1,d43f6c3699f8442d9285759c2e90cb7a4ef138460339054d721f73295a23e6c9,2024-07-09T18:19:14.047000 CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000 CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000 -CVE-2024-5810,0,0,aa0fbc94b7393c0e2bd009294947671029d457affd6caeeacb19248ec41c8887,2024-07-09T09:15:07.883000 +CVE-2024-5810,0,1,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000 CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000 CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000 @@ -256042,8 +256084,8 @@ CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1 CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000 CVE-2024-5851,0,0,1ff86bf427427298fe5dc39bbfedb897b9870fd2315cf065507e70165fb41d41,2024-06-13T18:36:09.013000 CVE-2024-5853,0,0,4db307c3757855b51e51fa12e1eb9aa67e540512d9bb40f822c5370c3893dc4f,2024-06-20T12:44:01.637000 -CVE-2024-5855,0,0,b90d3fcafd8e229d80167b4f5d2f3aed65497222ce1cbd14143f59d272d601d1,2024-07-09T02:15:10.437000 -CVE-2024-5856,0,0,21738f05eb7e46574ea83ef1a67e62d60b23f3e79a9d0275aef9e09a8caf5f19,2024-07-09T09:15:08.103000 +CVE-2024-5855,0,1,470fd388735694b7759ccf5036e6a18639fe074b164bc2d2da9695a799e80c03,2024-07-09T18:19:14.047000 +CVE-2024-5856,0,1,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc72,2024-07-09T18:19:14.047000 CVE-2024-5858,0,0,30241924d409355226bb80c4fb982c4833f84483f4f89b94e986f70fe7751e71,2024-06-17T12:42:04.623000 CVE-2024-5859,0,0,5b284a4381086ad6bad860c96074f61ed02c9601ee45c79362fb0f8a492df8fd,2024-06-24T19:21:07.943000 CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000 @@ -256055,7 +256097,7 @@ CVE-2024-5866,0,0,818f5ea49546cdae3583c6b6cf8ac2355af8dfa2dd6e771c0ddc9253a4f3db CVE-2024-5868,0,0,cddb0a1baa550d897574c2505eb276b5cd69c2fd57d27d79dec0dad91553a572,2024-06-17T12:42:04.623000 CVE-2024-5871,0,0,83e6d3ea3d7363cdcbcb485d9161ada2b3d6bba887290fa58ab89820983d4022,2024-06-17T12:42:04.623000 CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000 -CVE-2024-5881,0,0,d99f0c5d49f06ac3a6703d6887a7017de857a860a6afb1703f1790e556263ef3,2024-07-09T08:15:10.800000 +CVE-2024-5881,0,1,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000 CVE-2024-5885,0,0,3a664b64c018213b23c270dac1c0f4e2c55b9d60dc4c41c7b81af3f039474644,2024-06-27T19:25:12.067000 CVE-2024-5886,0,0,0c13c4ee009af0d9946120b2238809bd0a7459b4e90701a2a72b91121b1d711b,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,d25778d63809ce83c5015ef22b9910bd8e243f7933286be4466b9eb7c41e1b1a,2024-07-05T12:55:51.367000 @@ -256083,12 +256125,12 @@ CVE-2024-5933,0,0,43c62c8c7b78a3986e6c8a8e384c2c83973a07919e7ff71c58e74be82b63ae CVE-2024-5934,0,0,688a30e1a6237b69634d3ab7eb078a5b0fdbb09f93730eb6244fa568165f0ccc,2024-06-14T16:15:14.647000 CVE-2024-5935,0,0,21662e5830e79e4b40d11ee8d4ca61a28a55ce393198f32f5a0fb22a492448a1,2024-06-27T19:25:12.067000 CVE-2024-5936,0,0,dab5c088e03544c88b5524610f0cab10458f16230a50e10902868220b9e1d9db,2024-06-27T19:25:12.067000 -CVE-2024-5937,0,0,021cd48f36a6f236269dc72f34c759925b971cf637198fbaa0641099307f4da7,2024-07-09T09:15:08.490000 +CVE-2024-5937,0,1,51e02db0c012e8abf29c205fa293326baf9f1716cc7d665366a7580a75792510,2024-07-09T18:19:14.047000 CVE-2024-5938,0,0,cb9458c48aba8db651d9dffddd7092d96350e7e331bc06e4be8ccddeb7b09d02,2024-07-05T14:25:03.107000 -CVE-2024-5942,0,1,113cc7beeb08d524b60a394c0c59242af2ffb5f606d529aae03da21992ee2fbd,2024-07-09T16:02:08.180000 +CVE-2024-5942,0,0,113cc7beeb08d524b60a394c0c59242af2ffb5f606d529aae03da21992ee2fbd,2024-07-09T16:02:08.180000 CVE-2024-5943,0,0,43d6e7eaee5cf473c82f61329f5b629440390732fa8dcc1ef57a07502bd93742,2024-07-05T17:22:13.547000 CVE-2024-5945,0,0,16d17edcf79dde7bc004547e40419569c5bdcb3c9d1fafd4da124c600699d701,2024-06-24T19:24:00.433000 -CVE-2024-5946,0,0,2225a8ad24f13ec5412f426df027c613eeaa0c744957cd9457545b0fa2c7bcde,2024-07-09T11:15:16.400000 +CVE-2024-5946,0,1,eda339fb530ea9d144964218d587b435b3cb13f3a03c0fa86f823875ae12fdf1,2024-07-09T18:19:14.047000 CVE-2024-5947,0,0,7906fe5496c2633ac624599b4fcbe00d50eb988a8b518b82e602f8ca90719dc3,2024-06-17T12:43:31.090000 CVE-2024-5948,0,0,b50c023e3e038877d6c3f637d61b3c39fec4c81c008590663dc7a0096fec685c,2024-06-17T12:43:31.090000 CVE-2024-5949,0,0,d7dee9eee40bd92a70c4f623828d380d2dd593c00c7f59e1204a1a9d39be4822,2024-06-17T12:43:31.090000 @@ -256101,9 +256143,9 @@ CVE-2024-5965,0,0,e4e5e2ba71d4b8af3ca082d5b983b7d543db2cb3225d3445594ac7257368de CVE-2024-5966,0,0,1094a88c54e4e1132c185deaed255edc11e4f8b40d6974aff38c5955ab97cfc1,2024-06-24T20:00:23.970000 CVE-2024-5967,0,0,a8cf0971f84f68dc327704c7b15af8c68f3ca5a6cf4ca8aa54163d9ca95100d5,2024-06-20T12:44:01.637000 CVE-2024-5970,0,0,118b7b2e028a3447b60495fc36df0133e6c8ea6adad2a5f3d89bac8698786790,2024-06-20T12:44:01.637000 -CVE-2024-5971,0,0,af06e0b8f7221fbff27e214ceca41c9710a60bd48f4ce1837d97dd8d920b2b51,2024-07-09T06:15:03.200000 +CVE-2024-5971,0,1,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84d0,2024-07-09T18:19:14.047000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 -CVE-2024-5974,0,0,41bc2a5468ec6e846fb0d5ca66e59c6c799063474682442dfaf14d89f985b4c7,2024-07-09T03:15:02.507000 +CVE-2024-5974,0,1,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000 CVE-2024-5976,0,0,e855126a3e03657c0f9ccfb70e360e6531fe17aa442fb39ef6227c53616360fe,2024-06-17T12:43:31.090000 CVE-2024-5979,0,0,ecf851c3d3de50590eb0b5525283c723dc89573922e14c045baaee03d0d0831b,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,c1ed3bf259928f44163accb5dee81e38c4dedf71ab1a0c47da4cd2f2cf410bfa,2024-06-27T19:25:12.067000 @@ -256114,8 +256156,8 @@ CVE-2024-5985,0,0,a3999dbd8e5c44201127b8e29442b957795370a8f8e87c61e5520812fd9b79 CVE-2024-5988,0,0,770e11fe605a42d91c54053305f73879ff0c1b2c842aade7668a84f0f7563eaa,2024-06-25T18:50:42.040000 CVE-2024-5989,0,0,69ad5e4cb3103917933ecb3834316aad652ce0cd49e099c66afec489f3fe1c6c,2024-06-25T18:50:42.040000 CVE-2024-5990,0,0,59e04153c6e1abc93acdb73d87f0e07f1b496bfd6bce54a099578c87ba23e69e,2024-06-25T18:50:42.040000 -CVE-2024-5992,0,0,27f7eefc996678aeb57f9985e9ccb9819f902249022f4ddafa85560edcf49fee,2024-07-09T09:15:08.727000 -CVE-2024-5993,0,0,42b9d71187bb9ab2ee5fa0685c8ec076943c4645020121bf035e711b5c634eb8,2024-07-09T09:15:08.933000 +CVE-2024-5992,0,1,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000 +CVE-2024-5993,0,1,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000 CVE-2024-5994,0,0,4500c2f9d4ec1d929f4458a662d4e7cd25de0141c193b0c70f561f594ccb4e45,2024-06-17T12:42:04.623000 CVE-2024-5995,0,0,67a672f2d3fe90ec8a165b5b2ee31107e504c6b0bf47d01a6d89c94b17eb466b,2024-06-17T12:42:04.623000 CVE-2024-5996,0,0,ba461b354a3c080322d9eafe20058e5b8ad775b3a576a51cb3132f1460376b12,2024-06-17T12:42:04.623000 @@ -256160,7 +256202,7 @@ CVE-2024-6064,0,0,6c37569e777aad3e1a715d1d67e59381aa9d19e46235bcb0abd84ff598ca13 CVE-2024-6065,0,0,8dd99f4d37f301246412681f45228fac07d3ea15c1391b550b52738ce1d9d096,2024-06-20T12:44:01.637000 CVE-2024-6066,0,0,bdecbe263c05a4772a78f07626fc1e3f9d1817cac413c3ff735f168ece871a97,2024-06-20T12:44:01.637000 CVE-2024-6067,0,0,6728784af54ae6b64b1bb52b7887afb1ba68c7ac0e5f2ef2339910430d39d127,2024-06-20T12:44:01.637000 -CVE-2024-6069,0,0,1b276f756c5470e6a38a50e80dd3285ab69b37c68d5c6f6edac77c0aae733238,2024-07-09T09:15:09.130000 +CVE-2024-6069,0,1,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 CVE-2024-6071,0,0,10e78c82267f57981fcc90e3e22358a5c4cb7401eca3480df2296481e008838c,2024-06-28T10:27:00.920000 CVE-2024-6080,0,0,280d37fb165500fef7817a0477b29efc9416c53bd245603eb247ad266e840146,2024-06-20T20:15:20.583000 CVE-2024-6082,0,0,fb01e1189e5a394e265b664904a3543325f650fe09e01ea1f771a4558bb8508b,2024-06-20T19:15:50.437000 @@ -256170,7 +256212,7 @@ CVE-2024-6085,0,0,9ec0c5a378f12acda708e36f1fd937b6a37e47da0cf78939f5184a1970e8c2 CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd05154,2024-06-27T19:25:12.067000 CVE-2024-6088,0,0,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000 CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000 -CVE-2024-6095,0,1,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 +CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 CVE-2024-6099,0,0,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000 CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000 CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000 @@ -256187,7 +256229,7 @@ CVE-2024-6114,0,0,dc0a82373381e9c7cd4b1e6c5bf523878ecb08863d5210f6468d495d6395d8 CVE-2024-6115,0,0,3c5ab17ce7a1f33a2dee71d5335f67c2e99b7d6204dc28e4e10a70d6ca6b079a,2024-06-25T18:15:11.857000 CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000 CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000 -CVE-2024-6123,0,0,3c39b2540f6065a2384712f89d79546f6d3f035135c11de0c8209097d2b5a52c,2024-07-09T08:15:10.983000 +CVE-2024-6123,0,1,75695c59d88081a795c134128ddb6cd1415db185318a55dfce97b139d1d4e40d,2024-07-09T18:19:14.047000 CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000 CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000 CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000 @@ -256205,21 +256247,21 @@ CVE-2024-6147,0,0,4a4919271ad23db4250af2d646dfd99f64704c8a0c63e163a55ff156915fc4 CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837d5,2024-06-21T11:22:01.687000 CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000 CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000 -CVE-2024-6161,0,0,8f6d90a388ced3979ca9bb17cf8a3125f8794bbafb63020e611407fd33c5170b,2024-07-09T08:15:11.160000 +CVE-2024-6161,0,1,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 CVE-2024-6162,0,0,bd502c2e3c0167c78ca1c8188e0261103b8f8aa5eaa8e4a394c72d49dddda11b,2024-06-20T16:07:50.417000 CVE-2024-6163,0,0,fd093a646484e49cdcba7f0d5c73f035da9d8dc2d3299e73ed2192cb6789df3d,2024-07-08T15:49:22.437000 -CVE-2024-6166,0,0,5c4d52af9866858053c3eeea16d68907704a85cfdb8db169c7463c4ce71e2e87,2024-07-09T05:15:13.543000 -CVE-2024-6167,0,0,97765a7d4c5f520e94c07307d0280249002c0cd2877d7a2ca83e4d3b1a84aaca,2024-07-09T09:15:09.373000 -CVE-2024-6168,0,0,f809d5082005d22c3c0356bedac7493757c9599cadd674d2d1fd0f8a0b0c51f4,2024-07-09T09:15:09.597000 -CVE-2024-6169,0,0,ce8d122e0a50be6f8fa73ffe894d94184504d99eef0aeb8e273d477c681a2bdc,2024-07-09T05:15:13.737000 -CVE-2024-6170,0,0,0468d52887e9eae9812e1edfdf6b67c73acd7e11661c4df6b03ac9b47ecd36e7,2024-07-09T05:15:13.947000 -CVE-2024-6171,0,0,8e1eb909673fdd1b41df5f9a5c307f9b997bc3d03b662395e5999738418db058,2024-07-09T05:15:14.140000 +CVE-2024-6166,0,1,45a9bbf8d1e7aed01b7d229a0578b3d797a9f526a4ad693fe7c08afc0cc9c119,2024-07-09T18:19:14.047000 +CVE-2024-6167,0,1,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000 +CVE-2024-6168,0,1,a9d8b124b0d612b4817eae957707544bf3f1e74cb49f5394cfd698c29b52bb54,2024-07-09T18:19:14.047000 +CVE-2024-6169,0,1,fa61ef550b8c27ad32247abf7d2a9bb2ed4e7d05d7bad1322541319dba19c447,2024-07-09T18:19:14.047000 +CVE-2024-6170,0,1,e709769450a06d799568a3a51520c34e49767de0108f463b7a39095cd5afa73d,2024-07-09T18:19:14.047000 +CVE-2024-6171,0,1,bedb42afd0eac565fbcb26ecbc69ac87a73d246280d47b85fb72f8d3efe478fb,2024-07-09T18:19:14.047000 CVE-2024-6172,0,0,772bb913ed7f683b9ada9dc0ecd54a374149383f55e758d624c0fb5be0b0bf4c,2024-07-03T18:00:01.770000 CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000 CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000 CVE-2024-6178,0,0,00ba2b35f2bf326cfb9273c7e4ce551fc75b5ea6ed8191a2797d46901c2c36b7,2024-06-20T15:16:58.507000 CVE-2024-6179,0,0,e8ab8321b5bc66435edd1d020000d62a9dfc389aa4976b99e9d8c89f0a352015,2024-06-20T15:16:47.133000 -CVE-2024-6180,0,0,f92764fb17b16bed1ee4bd7a9bc95303d8624c8cf9d890f8801d4abaf5655abb,2024-07-09T08:15:11.350000 +CVE-2024-6180,0,1,ae7bf283ba8414ace0d3bfd9d7e72bd4b5eafadc11f0e00b9a21d42e8d6a993e,2024-07-09T18:19:14.047000 CVE-2024-6181,0,0,0da974dd3023ed556a9ed161f83e3c1684d21611899e57e27a1b7870d01089d3,2024-06-20T14:15:11.837000 CVE-2024-6182,0,0,55f26575758ff8ae57363c186f0de2f9404668e8c393b1bfe0761bb40f1950ac,2024-06-20T16:15:14.807000 CVE-2024-6183,0,0,36ef36bd2355643f28f7ca258857afbbd967c94a08629dbddde795f5b06dbcdf,2024-06-20T16:15:14.903000 @@ -256245,10 +256287,11 @@ CVE-2024-6215,0,0,df4b6f715533f7a136a874b234fd49d955e42066651a4d578c9a4d0ee59e3c CVE-2024-6216,0,0,163aaa10da8fbd3f1a722ddf5828825abea50c90fd2d9b89c4bf2c73ab93f6b3,2024-06-24T20:15:11.177000 CVE-2024-6217,0,0,3711ed31aaa9f7586428ac093ba9118453625e92a316540d8e0c90d5655ba292,2024-06-21T11:22:01.687000 CVE-2024-6218,0,0,080145c08c5ffaf1b0f4fe61601c30772836ccbea26d111bc22bd57681c581e7,2024-06-21T15:15:16.547000 +CVE-2024-6222,1,1,7d8ad82668d6d98e0f167e915dde6d9fa8875b44590f66f2e873d05e89e24789,2024-07-09T18:18:38.713000 CVE-2024-6225,0,0,05da1495d7d116987721ea4d8dad783669e833db8afd42c6e9b9d7b36358250e,2024-06-24T19:21:28.450000 -CVE-2024-6227,0,0,2f458d579251e5797009cb44cde13dcccac965d4c58be3abcc42eea14d8770e8,2024-07-08T19:15:10.673000 +CVE-2024-6227,0,1,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000 CVE-2024-6229,0,0,8c75c4089f9bb2b690871cceb6de9502d8662dbaa4dc8109053b9a0e9bdfb643,2024-07-08T15:49:22.437000 -CVE-2024-6237,1,1,58ca62b099684ca33fac4461bca68023cfd75f51cd4025c548439a8eb842f413,2024-07-09T17:15:48.960000 +CVE-2024-6237,0,1,8eb889363f8a87d3bb3f430f1da56ccf68ff66b11eeffce13455da0850e4107b,2024-07-09T18:18:38.713000 CVE-2024-6238,0,0,01bce4fcd5bf21099e3fa29fb7e34bf0d2a461d152d0ae3d9b913c1fb46d1451,2024-06-25T18:50:42.040000 CVE-2024-6239,0,0,4d98a21d53ef2e5917897cadc254a12ee654ff1e3575a82a15151981272f61b5,2024-06-24T19:06:27.537000 CVE-2024-6240,0,0,3ba60659d5977ed2c81ae70dc02c754f9eebbd14309190bebb86d2a019bd47a8,2024-06-24T19:10:38.983000 @@ -256297,18 +256340,18 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372 CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000 CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 -CVE-2024-6309,0,0,6ee7b9bdd6e3d44a1c321b518b7abefd3a66fc0a2ef1dda4170f5d93396eaac9,2024-07-09T08:15:11.550000 -CVE-2024-6310,0,0,363b599ac76e399027da88649a3007699fba0c045d7f3b46e5ccabc4f3507676,2024-07-09T08:15:11.733000 -CVE-2024-6313,0,0,9de650ae5f3c1b23a3ee71125d4a89f8f1a8ee06b3b5592c0cfc9a289177e210,2024-07-09T08:15:11.907000 -CVE-2024-6314,0,0,02cd9ec77dfe322efdc50bd26d3136ca49fae2a6e4ce47da822c660558b854cc,2024-07-09T08:15:12.090000 -CVE-2024-6316,0,0,8e386b9bc7dd7af27ea8f0be4e2ea844fd7b710d9a854fac065c4e1e1c16838d,2024-07-09T08:15:12.270000 -CVE-2024-6317,0,0,acecd8038bf902e737ab862ed23cec222b7fa1a6bee339c49ff7a51ab685e03c,2024-07-09T08:15:12.470000 +CVE-2024-6309,0,1,81d9ed106c3d88c28590c6ed22c5b32147121a952907a1333c0b11de5b47c5b3,2024-07-09T18:19:14.047000 +CVE-2024-6310,0,1,c979f814f3e48b96dc9635b552e8c56621ee7c90068be27a9e484f3e9730aa89,2024-07-09T18:19:14.047000 +CVE-2024-6313,0,1,3f3a1eb3f6568b25e7e4a0a5a221dc14475a69801be2f42305fb08dd6e12247b,2024-07-09T18:19:14.047000 +CVE-2024-6314,0,1,d18fb3c15bbc48d64598d0e894895cc32debae6dd1aff2381c9e4370989d88ec,2024-07-09T18:19:14.047000 +CVE-2024-6316,0,1,2502aa4aa8a75c78b1ff7616f196f5ea2c6bbeeaa6ba8969ec380a7c7c45c5a7,2024-07-09T18:19:14.047000 +CVE-2024-6317,0,1,a1663e520ee7a1fd4e0656fad92e205c6b007f5696cf4b3a2530eaf01569d326,2024-07-09T18:19:14.047000 CVE-2024-6318,0,0,87eaacee4d7a5063296249046cfb20a5128d5a5e29b5c82ab7a2c5bbe9407d34,2024-07-05T17:21:36.523000 CVE-2024-6319,0,0,a7e6ba0611df1872f885f28b22290254a0a0617427fbf4cb3644f1333e4d6a0e,2024-07-05T17:21:47.817000 -CVE-2024-6320,0,0,168720ff84c04be90fffa79eb23ccbf7f492f3c63143fe9db97fda9579af3b54,2024-07-09T08:15:12.643000 -CVE-2024-6321,0,0,6d2cb325bc73d3c1690fc650105b4de8550d7a89e7af760baa6a223b7a4f6e73,2024-07-09T08:15:12.843000 +CVE-2024-6320,0,1,283f9bb36ccc5b92b087cc9c4a1fe708efc80654f72e1f9e7ff8264ce58552c9,2024-07-09T18:19:14.047000 +CVE-2024-6321,0,1,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced507d,2024-07-09T18:19:14.047000 CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 -CVE-2024-6334,0,0,1fabdf3c3dae976eba03f6706603b2e032950d14621f437dc82a4eff61a1363b,2024-07-09T06:15:03.383000 +CVE-2024-6334,0,1,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 @@ -256316,7 +256359,7 @@ CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd0 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000 CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000 -CVE-2024-6365,0,0,fcbce586cbad80cebdef2a9ececdb44751b1b32b76d3bac4f807faf6d1ade07b,2024-07-09T04:15:15.333000 +CVE-2024-6365,0,1,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000 CVE-2024-6367,0,0,7207995286cd77894417e443ceec13186f4617a3d835dc70f545e6022e4f6dc9,2024-06-27T12:47:19.847000 CVE-2024-6368,0,0,15233ad7ff1f989e7bdf86db89d9527b042f90cc8844e61c0b9d2d12d522b414,2024-06-27T18:15:21.083000 CVE-2024-6369,0,0,c793378edfea0b2a8c32a50d08899943167a983433e0948af5044c43e0a7ad33,2024-06-27T12:47:19.847000 @@ -256332,11 +256375,11 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 CVE-2024-6387,0,0,2cb574ee4871bb718c266363f4935438773ab80425b02db4e2887c70e2205fbf,2024-07-09T12:15:20.780000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 -CVE-2024-6391,0,0,3a98cb2168c913412a537cc5d11676c52c9af918e469a53512b771c0aae2767f,2024-07-09T12:15:21.093000 +CVE-2024-6391,0,1,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 -CVE-2024-6409,0,0,3aec65f9579b23d73b9e3e03eae2420d7f442d15ea5984d46b4140838dea0a5a,2024-07-09T15:15:12.140000 +CVE-2024-6409,0,1,1753695fcda1b0cad9fc4b96f3590c22992ed88991520dc6c3bae1c618abf807,2024-07-09T18:19:14.047000 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 @@ -256371,25 +256414,25 @@ CVE-2024-6523,0,0,98f0a109b2eb43c22795bc145187860635580ebf6919d959b6614038101f80 CVE-2024-6524,0,0,a7a803cd0c4b163adf24a214658dd36dbf3d93b3905b2171e3d08048b915cbe3,2024-07-08T15:33:01.377000 CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b927,2024-07-08T15:30:11.133000 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 -CVE-2024-6527,0,0,5e40e5b852c4a5570defa26f7db66e975d6619eb7b0826087423c18a402c137c,2024-07-09T14:15:04.667000 +CVE-2024-6527,0,1,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000 CVE-2024-6539,0,0,af7a9107d7b462a59e1314d81ee0ea249c00edb3c899ac73079834fee3e5a982,2024-07-08T15:49:22.437000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 -CVE-2024-6580,0,0,9fe1fe4b7ce94d43637819ea5c5528d95bb6f6693286419c6429480c6e872ebe,2024-07-08T19:15:10.913000 -CVE-2024-6598,0,0,4d06dfa4cb552c885a1668f7a37c1160ae022325a50aa19c59c12e497188a4ac,2024-07-09T14:15:04.803000 -CVE-2024-6600,0,0,a555027148aaa4f0a4f9d962ebde41763b5aef20aa89fe28773af45d3cc3a790,2024-07-09T15:15:12.273000 -CVE-2024-6601,0,0,a0f37e90d7a98caa547ac2231b8412a0fde46a7eb9b60a9dfb70782ace6cda1f,2024-07-09T15:15:12.410000 -CVE-2024-6602,0,0,bde87a68d6c5c4301708f2e91f52e96b6b7e1fcd8851a1ff8bcb9a938aa6e4f1,2024-07-09T15:15:12.473000 -CVE-2024-6603,0,0,29b28c52d6f7cb4d5de9d30b6ccdfe51dfa9d98fc4c85a25027eaf97481ef536,2024-07-09T15:15:12.533000 -CVE-2024-6604,0,0,aec645a4be852538cc0857ab4e9734a33d4ef2536432e175c60207c7b97b4c8e,2024-07-09T15:15:12.597000 -CVE-2024-6605,0,0,0681c86093ed115531a2a0b0617cf52db39939ae9513d1546cf2888e3f044aa2,2024-07-09T15:15:12.660000 -CVE-2024-6606,0,0,d42530a2da43e5a8119758d18ecd6a4f3bcf3c4b20422dc4d2e55a936de54ffd,2024-07-09T15:15:12.727000 -CVE-2024-6607,0,0,87250148fa3f7e2b1df9ecfa4a97126cb753f115ec37412ed5bb0003dd67ddf7,2024-07-09T15:15:12.790000 -CVE-2024-6608,0,0,3ee2d3e8439dcf02e7fb744da567a5b7bdada352734935c7f012ba37c99b4456,2024-07-09T15:15:12.863000 -CVE-2024-6609,0,0,efc93df9b681bcadf7cb96a59342837bd036811ea30170ef8dec867826a7249e,2024-07-09T15:15:12.923000 -CVE-2024-6610,0,0,41bc2123a42eab32d1bfcc7d9cab52e8a71cef17ddec6b86ae2361fdfcb89b3e,2024-07-09T15:15:12.983000 -CVE-2024-6611,0,0,fd192b2d2b194712375ea109359cd4f0ca07ff9bb290462fd913315f384bde9a,2024-07-09T15:15:13.047000 -CVE-2024-6612,0,0,3a55a24a662fc8bfa3f6f1cfd0dd64af6d7f140c3dd99cd50da45d1af5853ad8,2024-07-09T15:15:13.107000 -CVE-2024-6613,0,0,ab528cead3a4ed21fc69ab1528d5bf392bd10410110baf78dd9108ab31a2cee9,2024-07-09T15:15:13.170000 -CVE-2024-6614,0,0,5bbaed2fdd3868476a3daacdb5340b7f16eaffa7d77500d36f45b25fe82cba6b,2024-07-09T15:15:13.237000 -CVE-2024-6615,0,0,7885e593863c8cf4366a966327b04062a0bed4ea770e3b1b652b0bfb672e2a57,2024-07-09T15:15:13.307000 +CVE-2024-6580,0,1,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 +CVE-2024-6598,0,1,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000 +CVE-2024-6600,0,1,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000 +CVE-2024-6601,0,1,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000 +CVE-2024-6602,0,1,d1ff783c5dd57788da04ea9a9259d9f3561993a50c353a427b76cce1bf3766e2,2024-07-09T18:19:14.047000 +CVE-2024-6603,0,1,4ecaf7f985dbded3472c683f2c65d1c14d2799a2b7dcf2b2a55860d4c957784c,2024-07-09T18:19:14.047000 +CVE-2024-6604,0,1,ded876613061a5ca60e02a968a482333e8188e2340c41c58460e50b9c735c643,2024-07-09T18:18:38.713000 +CVE-2024-6605,0,1,daaffd6e1eb7775c366bd3629df32e5ec237220285a28f594449800d239e72c3,2024-07-09T18:18:38.713000 +CVE-2024-6606,0,1,f864c1684a72549611b7f7fcae4f61ef1f79247e95bb6b2096503289022181c4,2024-07-09T18:18:38.713000 +CVE-2024-6607,0,1,4125d39d31df77d668fb24ccf5c1ced11947df2c4ba369deba85906910908188,2024-07-09T18:18:38.713000 +CVE-2024-6608,0,1,e0b85615d2e08968fb3ea9bcf0763d4f346f2fd1f6fb5d15c9d79ca0c6f143f3,2024-07-09T18:18:38.713000 +CVE-2024-6609,0,1,f532a8285aec61f63bc1d215d0415fae1421a37936276e9ad08f4683700f018b,2024-07-09T18:18:38.713000 +CVE-2024-6610,0,1,1c24792ae39b605f1be07c5e2e3836fd3d6fa372741ef0758f0367b32c7ef3f4,2024-07-09T18:18:38.713000 +CVE-2024-6611,0,1,a25dcfb031bb1c8a6c9b6fef48b3c79624f176477e1f6964d7a1b5addbbe26dc,2024-07-09T18:18:38.713000 +CVE-2024-6612,0,1,8ea660f335d1e8552a64db073fe7466306fd1f2e5cc9fbb77910ed6aa806d566,2024-07-09T18:18:38.713000 +CVE-2024-6613,0,1,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c0a,2024-07-09T18:18:38.713000 +CVE-2024-6614,0,1,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000 +CVE-2024-6615,0,1,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000